Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
  1. Architecture overview
  2. Implementation and documentation
    1. Syslog clients
    2. Syslog accumulator
    3. Database schema
    4. Monitor
    5. Integration patterns
  3. Availability concerns
    1. Failure patterns and mitigations
  4. Related concerns / Best practices for credential stores
    1. Protection against password theft (vs guessing)
    2. "Backoff" procedures
    3. CAPTCHA
    4. IP address tracking
  5. Will this pass audit?