You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

  1. Architecture overview
  2. Implementation and documentation
    1. Syslog clients
    2. Syslog accumulator
    3. Database schema
    4. Monitor
    5. Integration patterns
  3. Availability concerns
    1. Failure patterns and mitigations
  4. Related concerns / Best practices for credential stores
    1. Protection against password theft (vs guessing)
    2. "Backoff" procedures
    3. CAPTCHA
    4. IP address tracking
  5. Will this pass audit?
  • No labels