FAQ / NISTIR 8259 FAQ / Who can review the logs or notifications? Please describe the authentication and authorization procedures to protect the logs and notifications from unauthorized access?

Who can review the logs or notifications? Please describe the authentication and authorization procedures to protect the logs and notifications from unauthorized access?

Who can review the logs or notifications? Please describe the authentication and authorization procedures to protect the logs and notifications from unauthorized access?

2022-06-01

if different storages are used, please
describe the authentication and authorization procedures respectively.

Due to limited local storage capacity, the device
does not store log information locally, but uploads it to cloud storage through
an encrypted channel. In the cloud service, only the database management
account has the authority to view log information. If the account is not
authorized, access to the device log information is prohibited.

SHARE
Open chat
Hello, Welcome to JimiIOT
Can we help you?