Users in a datacenter or cloud system, including privileged users (e.g., root-level users), should be accountable for all of their actions within the system, regardless of their privileges. A secure logging solution that is resistant to tampering can help achieve this objective. Techniques disclosed herein enable secure logging without compromising management of confidential data. More specifically, the disclosure describes a system that processes and stores log messages in such a way that they are tamper-evident. Tamper-evident logs can be virtually impervious to undetectable manipulation, even by the highly privileged root-level users of such a system. A secure, tamper-evident logging solution can be implemented using trusted platforms implemented in software or hardware, e.g., secure element platforms, secure enclave solutions, virtual trusted platform modules, etc.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.