EventLog Analyzer

-

IT Compliance & Event Log Management Software for SIEM

GLBA Compliance Audit Reports

Compliance Audit Reports for Gramm-Leach-Bliley Act (GLBA)

GLBA Compliance Audit Report

Section 501 of the Gramm-Leach-Bliley Act (GLBA) documents specific regulations required for financial institutions to protect "non-public personal information". As part of the GLBA requirements, it is necessary that a security management process exists in order to protect against attempted or successful unauthorized access, use, disclosure, modification, or interference of customer records. In other words being able to monitor, report and alert on attempted or successful access to systems and applications that contain sensitive customer information.

EventLog Analyzer meets the system monitoring and reporting requirements of GLBA Regulations. With EventLog Analyzer, you can easily monitor your network systems for any insider activity. GLBA regulations mandate analysis of all logs, including OS and application logs.


The types of reports that EventLog Analyzer provides for GLBA Audits are as follows:

  • User Logon report:
    GLBA Compliance requirements clearly state that user accesses to the system be recorded and monitored for possible abuse. Remember, this intent is not just to catch hackers but also to document the accesses to medical details by legitimate users. In most cases, the very fact that the access is recorded is deterrent enough for malicious activity, much like the presence of a surveillance camera in a parking lot.
  • User Logoff report:
    GLBA requirements clearly state that user accesses to the system be recorded and monitored for possible abuse. Remember, this intent is not just to catch hackers but also to document the accesses to medical details by legitimate users. In most cases, the very fact that the access is recorded is deterrent enough for malicious activity, much like the presence of a surveillance camera in a parking lot.
  • Logon Failure report:
    The security logon feature includes logging all unsuccessful login attempts. The user name, date and time are included in this report.
  • Audit Logs Access report:
    GLAB requirements (review and audit access logs) calls for procedures to regularly review records of information system activity such as audit logs.