Episode 86 — Align IAM Logging With Policies and Regulations Including PCI DSS and GDPR
Failed to add items
Add to basket failed.
Add to Wish List failed.
Remove from Wish List failed.
Follow podcast failed
Unfollow podcast failed
-
Narrated by:
-
By:
About this listen
This episode ties identity and access logging to policy and regulatory expectations, showing how to design evidence that satisfies both security outcomes and compliance requirements, which ISSAP frequently tests by mixing audit language with real-world architecture constraints. You’ll learn how to align IAM log content, retention, access controls, and reporting to organizational policies and to common regulatory drivers, focusing on accountability, least privilege enforcement, and proof that access to sensitive systems and data is monitored and reviewed. We’ll cover practical examples such as logging administrative actions on payment systems, tracking access to personal data repositories, documenting access reviews and exceptions, and ensuring logs are protected as sensitive data themselves under privacy rules. Troubleshooting considerations include collecting more personal data than necessary in logs, missing required events because integrations were incomplete, and retention settings that conflict across legal, privacy, and security needs. This is the last episode in the series, and it brings the logging and IAM threads together into a single defensible approach you can apply on the exam and in real architecture reviews. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.