The audit monitor mechanism is used to collect audit tracking data for networks and IT resources in support of (or dictated by) regulatory and contractual obligations. Figure 1 depicts an audit monitor implemented as a monitoring agent that intercepts "login" requests and stores the requestor's security credentials, as well as both failed and successful login attempts, in a log database for future audit reporting purposes.
Figure 1 - A cloud service consumer requests access to a cloud service by sending a login request message with security credentials (1). The audit monitor intercepts the message (2) and forwards the message to the authentication service (3). The authentication service processes the security credentials. A response message is generated for the cloud service consumer, in addition to the results from the login attempt (4). The audit monitor intercepts the response message and stores the entire collected login event details in the log database, as per the organization's audit policy requirements (5). The response message is forwarded back to the cloud service consumer (6).
- Centralized Remote Administration
- Cross-Storage Device Vertical Tiering
- Dynamic Failure Detection and Recovery
- Realtime Resource Availability
- Resource Management
- Resource Pooling
- Resource Reservation
- Shared Resources
- Storage Workload Management
- Usage Monitoring
- Workload Distribution
- Zero Downtime