{"id":64702,"date":"2024-10-23T07:53:44","date_gmt":"2024-10-23T05:53:44","guid":{"rendered":"https:\/\/www.complior.se\/?p=64702"},"modified":"2026-03-12T23:17:12","modified_gmt":"2026-03-12T22:17:12","slug":"saker-lagring-del-4","status":"publish","type":"post","link":"https:\/\/complior.se\/en\/saker-lagring-del-4\/","title":{"rendered":"Safe Storage: Part 4"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-4ebe95a9 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-627ud4 is-vertical is-layout-flex wp-container-core-group-is-layout-fe9cc265 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns64702_c962ab-4b\"><a class=\"kb-button kt-button button kb-btn64702_9f19b2-68 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-fill  kt-btn-has-text-true kt-btn-has-svg-true  wp-block-kadence-singlebtn\" href=\"https:\/\/complior.se\/en\/resources\/\"><span class=\"kb-svg-icon-wrap kb-svg-icon-fe_arrowLeft kt-btn-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><line x1=\"19\" y1=\"12\" x2=\"5\" y2=\"12\"\/><polyline points=\"12 19 5 12 12 5\"\/><\/svg><\/span><span class=\"kt-btn-inner-text\">Tillbaka till resurser<\/span><\/a><\/div>\n\n\n\n<span class=\"kt-adv-heading64702_19a911-2e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_19a911-2e\">Blog<\/span>\n\n\n\n<h1 class=\"kt-adv-heading64702_c2b286-1e animated fadeIn wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_c2b286-1e\">Traceability and logging &amp; Encryption<\/h1>\n\n\n\n<div class=\"wp-block-group animated fadeIn is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\"><div class=\"publish-date-container\">\r\n\t<svg\r\n\t\twidth=\"16\"\r\n\t\theight=\"16\"\r\n\t\tviewbox=\"0 0 24 24\"\r\n\t\tfill=\"none\"\r\n\t\tstroke=\"#4b4b4b\"\r\n\t\tstroke-width=\"2\"\r\n\t\tstroke-linecap=\"round\"\r\n\t\tstroke-linejoin=\"round\"\r\n\t\txmlns=\"http:\/\/www.w3.org\/2000\/svg\"\r\n\t\taria-hidden=\"true\"\r\n\t>\r\n\t\t<rect x=\"3\" y=\"4\" width=\"18\" height=\"18\" rx=\"2\" ry=\"2\"><\/rect>\r\n\t\t<line x1=\"16\" y1=\"2\" x2=\"16\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"8\" y1=\"2\" x2=\"8\" y2=\"6\"><\/line>\r\n\t\t<line x1=\"3\" y1=\"10\" x2=\"21\" y2=\"10\"><\/line>\r\n\t<\/svg>\r\n\t<span class=\"date-text\">\r\n\t\tOct 23, 2024\t<\/span>\r\n<\/div>\n\n\n<h1 class=\"kt-adv-heading64702_cba639-c2 wp-block-kadence-advancedheading kt-adv-heading-has-icon animated fadeIn delay-100ms\" data-kb-block=\"kb-adv-heading64702_cba639-c2\"><span class=\"kb-svg-icon-wrap kb-adv-heading-icon kb-svg-icon-fe_clock kb-adv-heading-icon-side-left\"><svg viewbox=\"0 0 24 24\"  fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"  aria-hidden=\"true\"><circle cx=\"12\" cy=\"12\" r=\"10\"\/><polyline points=\"12 6 12 12 16 14\"\/><\/svg><\/span><span class=\"kb-adv-text-inner\">5 min <\/span><\/h1><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-kadence-image kb-image64702_e16720-ca\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"595\" src=\"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg\" alt=\"Person working on laptop and looking at online secure file sharing and inspection\" class=\"kb-img wp-image-73613\" srcset=\"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg 1000w, https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online-300x179.jpg 300w, https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online-768x457.jpg 768w, https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online-18x12.jpg 18w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b70487ad alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-group blockera-block blockera-block-x2wuzq is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_65e379-78 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_65e379-78\">Traceability and logging<\/h2>\n\n\n\n<p class=\"kt-adv-heading64702_c8c47f-34 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_c8c47f-34\">Tydlig sp\u00e5rbarhet genom loggning av alla \u00e5tkomstf\u00f6rs\u00f6k och datatransaktioner \u00e4r en avg\u00f6rande komponent f\u00f6r att kunna uppt\u00e4cka, utreda och f\u00f6rhindra s\u00e4kerhetsincidenter. Loggning fungerar som en &#8221;svart l\u00e5da&#8221; f\u00f6r systemet, vilket ger insyn i hur data hanteras och anv\u00e4nds. Genom att \u00f6vervaka och dokumentera varje interaktion med k\u00e4nslig information skapas ett ov\u00e4rderligt verktyg f\u00f6r b\u00e5de proaktiv och reaktiv s\u00e4kerhetshantering.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-28ith0 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_e4fe28-e8 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_e4fe28-e8\">What should the logging include?<\/h2>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-5pzpxc is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading64702_b71ff3-c5 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_b71ff3-c5\">Vem som har f\u00e5tt \u00e5tkomst<\/h3>\n\n\n\n<p class=\"kt-adv-heading64702_ea8c9f-fd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_ea8c9f-fd\">Identifiering av anv\u00e4ndaren (inklusive deras roll eller beh\u00f6righeter) som f\u00f6rs\u00f6ker f\u00e5 tillg\u00e5ng till information. Detta inkluderar b\u00e5de interna anv\u00e4ndare och externa parter, s\u00e5som konsulter eller leverant\u00f6rer. Loggen ska \u00e4ven kunna kopplas till individens autentiseringsmetod (t.ex. l\u00f6senord eller tv\u00e5faktorsautentisering).<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-5pzpxc is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading64702_83395a-44 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_83395a-44\">N\u00e4r \u00e5tkomsten skedde<\/h3>\n\n\n\n<p class=\"kt-adv-heading64702_41432e-85 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_41432e-85\">Exakta tidsst\u00e4mplar f\u00f6r varje \u00e5tkomst f\u00f6rs\u00f6k eller data transaktion. Genom att veta n\u00e4r en specifik \u00e5tg\u00e4rd intr\u00e4ffade kan organisationen snabbt identifiera misst\u00e4nkta eller obeh\u00f6riga \u00e5tkomst f\u00f6rs\u00f6k, exempelvis utanf\u00f6r ordinarie arbetstider.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-5pzpxc is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading64702_8c762e-4f wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_8c762e-4f\">Varifr\u00e5n \u00e5tkomsten gjordes<\/h3>\n\n\n\n<p class=\"kt-adv-heading64702_42178c-d3 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_42178c-d3\">Information om plats eller enhet d\u00e4r \u00e5tkomsten skedde, s\u00e5som IP-adress, n\u00e4tverksplats eller enhetstyp (mobil, dator eller surfplatta). Detta g\u00f6r det m\u00f6jligt att bed\u00f6ma om \u00e5tkomsten skett fr\u00e5n s\u00e4kra eller potentiellt os\u00e4kra platser.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-5pzpxc is-vertical is-layout-flex wp-container-core-group-is-layout-90752e8f wp-block-group-is-layout-flex\">\n<h3 class=\"kt-adv-heading64702_9be658-dd wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_9be658-dd\">Vad anv\u00e4ndaren har gjort med informationen<\/h3>\n\n\n\n<p class=\"kt-adv-heading64702_c4b538-c1 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_c4b538-c1\">Loggningen b\u00f6r omfatta vilka filer eller data som har \u00f6ppnats, \u00e4ndrats, delats, kopierats eller raderats. Detta ger en fullst\u00e4ndig bild av anv\u00e4ndarens aktivitet och kan avsl\u00f6ja potentiellt skadliga beteenden, som omfattande datakopiering eller delning av k\u00e4nslig information med obeh\u00f6riga.<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-ol5c7n is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_aafa2b-29 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_aafa2b-29\">Traceability and logging<\/h2>\n\n\n\n<p class=\"kt-adv-heading64702_974f44-ea wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_974f44-ea\">En v\u00e4lutvecklad loggningsfunktion g\u00f6r det m\u00f6jligt att snabbt identifiera potentiella s\u00e4kerhetsincidenter. Vid dataintr\u00e5ng kan loggar anv\u00e4ndas f\u00f6r att analysera hur incidenten intr\u00e4ffade, vilka data som exponerades och vilket hot det utg\u00f6r. Detta m\u00f6jligg\u00f6r snabbare \u00e5tg\u00e4rder s\u00e5som isolering av incidenten och \u00e5terst\u00e4llning av system.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-17sb02s is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_d26e89-00 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_d26e89-00\">Compliance and reporting<\/h2>\n\n\n\n<p class=\"kt-adv-heading64702_081638-2a wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_081638-2a\">In many industries, particularly in the public sector, finance and healthcare, organizations are required\nto comply with specific laws and regulations that require traceability. Examples of such regulations\ninclude the General Data Protection Regulation (GDPR), which requires organizations to be able to\ndemonstrate that personal data is handled securely and that all access attempts to this data are\ndocumented. Logs help organizations meet these requirements by providing a history of how data has\nbeen handled and by whom.<\/p>\n\n\n\n<p class=\"kt-adv-heading64702_2d065a-ad wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_2d065a-ad\">If an organization suffers a security incident where sensitive information is compromised, it is often\nrequired to report to regulatory authorities. Clear and detailed logs enable the organization to quickly\ncompile the necessary information and prove that appropriate measures have been taken to protect\ndata. This can reduce fines and other penalties and improve the trust of customers and business\npartners.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1us4xzn is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_01a653-05 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_01a653-05\">Automation and analysis<\/h2>\n\n\n\n<p class=\"kt-adv-heading64702_edd313-36 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_edd313-36\">M\u00e5nga moderna s\u00e4kerhetssystem anv\u00e4nder automatiserad loggning och analysverktyg f\u00f6r att snabbt uppt\u00e4cka avvikelser i anv\u00e4ndarbeteende och potentiella s\u00e4kerhetshot. Till exempel kan systemen varna om en anv\u00e4ndare pl\u00f6tsligt b\u00f6rjar ladda ner ovanligt stora m\u00e4ngder data, eller om \u00e5tkomstf\u00f6rs\u00f6k g\u00f6rs fr\u00e5n en ovanlig plats. Automatiserad incidentrespons kan \u00e4ven blockera \u00e5tkomst direkt om ett potentiellt intr\u00e5ng uppt\u00e4cks.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1us4xzn is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_00055c-b0 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_00055c-b0\">The role of logging in auditing and security improvement<\/h2>\n\n\n\n<p class=\"kt-adv-heading64702_2d8aa4-3e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_2d8aa4-3e\">Loggar spelar en viktig roll vid regelbundna s\u00e4kerhetsrevisioner. Organisationer kan anv\u00e4nda loggdata f\u00f6r att analysera \u00e5tkomstm\u00f6nster, identifiera svagheter i \u00e5tkomstkontroller och f\u00f6rb\u00e4ttra sina s\u00e4kerhetspolicyer. Genom att regelbundet granska loggar kan man uppt\u00e4cka och \u00e5tg\u00e4rda potentiella s\u00e4kerhetsbrister innan de utnyttjas av obeh\u00f6riga.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-1dqo402 is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_af9720-31 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_af9720-31\">Encryption<\/h2>\n\n\n\n<p class=\"kt-adv-heading64702_efb6ae-0e wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_efb6ae-0e\">Strong encryption is a fundamental security measure to protect sensitive information, both when it is\nstored and when it is transmitted. Encrypting data ensures that even if information is stolen or lost, it\ncannot be read by unauthorized persons.\nEncryption should be used on all sensitive data, and organizations should regularly update their\nencryption methods to stay in line with the latest security standards.<\/p>\n\n\n\n<p class=\"kt-adv-heading64702_eca274-5d wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_eca274-5d\">Regardless of whether the encryption takes place on a local file server or in a public cloud service, it is\nimportant to meet the requirements for HYOK (Hold Your Own Key). With HYOK, the organization\ngains complete control over its data by creating, storing and managing the encryption key itself. This\nkey is protected by an HSM (Hardware Security Module), which ensures that the key is stored and\nhandled in a very secure manner.<\/p>\n\n\n\n<p class=\"kt-adv-heading64702_6411a1-b2 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_6411a1-b2\">Genom att anv\u00e4nda sin egen krypteringsnyckel kan organisationen skydda sin data oberoende av tredjepartsleverant\u00f6rer, och den har d\u00e4rmed total \u00e4gander\u00e4tt och kontroll \u00f6ver datan. Detta inneb\u00e4r att krypteringsnyckeln kan lagras i Sverige, under svensk suver\u00e4nitet och lagstiftning, vilket \u00e4r<\/p>\n\n\n\n<p class=\"kt-adv-heading64702_901b38-49 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_901b38-49\">An important protection that HYOK offers is that it prevents, for example, a cloud provider from being\nforced to release data under laws such as FISA (Foreign Intelligence Surveillance Act) in the US,\nbecause the provider does not have access to the encryption key. Additionally, HYOK prevents the\ncloud provider's administrators, or a potential attacker who steals their keys, from accessing the\norganization's data. Keeping control of its own encryption key minimizes the risk of unauthorized\naccess and ensures that no one but the organization itself can decrypt and access the sensitive\ninformation.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-group blockera-block blockera-block-cq0ylf is-vertical is-layout-flex wp-container-core-group-is-layout-b2c973f4 wp-block-group-is-layout-flex\">\n<h2 class=\"kt-adv-heading64702_2c1225-d4 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_2c1225-d4\">Complior<\/h2>\n\n\n\n<p class=\"kt-adv-heading64702_6bdea1-f6 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_6bdea1-f6\">Ensuring a robust secure storage solution requires not only technical solutions but also compliance\nwith legal and regulatory requirements. By using modern methods of encryption and key\nmanagement, companies and organizations can guarantee full control over their data, whether it is\nstored locally or in a public cloud service.<\/p>\n\n\n\n<p class=\"kt-adv-heading64702_0b843c-59 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_0b843c-59\">Complior erbjuder en bred upps\u00e4ttning s\u00e4kerhetstj\u00e4nster f\u00f6r organisationer som vill skydda sina k\u00e4nsligaste data. Genom sin PCI DSS-certifierade molninfrastruktur och tj\u00e4nster som HSM och Key Management Systems (KMS) kan f\u00f6retag enkelt implementera s\u00e4kra l\u00f6sningar f\u00f6r lagring, nyckelhantering och efterlevnad av regler som GDPR, PCI DSS, DORA och NIS2.<\/p>\n\n\n\n<p class=\"kt-adv-heading64702_a58ba5-52 wp-block-kadence-advancedheading\" data-kb-block=\"kb-adv-heading64702_a58ba5-52\"><a href=\"https:\/\/www.archtis.com\/\" type=\"link\" id=\"https:\/\/www.archtis.com\/\">archTIS <\/a>partnerskapet har st\u00e4rkt utbudet ytterligare genom NC Protect och NC Encrypt, som m\u00f6jligg\u00f6r automatisk klassificering och skydd av ostrukturerad data i Microsoft 365 och andra milj\u00f6er.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-2ab15fae\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-d12e540a wp-block-button scale-hover\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"http:\/\/complior.se\/en\/contact\/\" rel=\"follow noopener\" target=\"_blank\" role=\"button\"><div class=\"uagb-button__link\">Contact us<\/div><span class=\"uagb-button__icon uagb-button__icon-position-after\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\" aria-hidden=\"true\" focussable=\"false\"><path d=\"M438.6 278.6l-160 160C272.4 444.9 264.2 448 256 448s-16.38-3.125-22.62-9.375c-12.5-12.5-12.5-32.75 0-45.25L338.8 288H32C14.33 288 .0016 273.7 .0016 256S14.33 224 32 224h306.8l-105.4-105.4c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l160 160C451.1 245.9 451.1 266.1 438.6 278.6z\"><\/path><\/svg><\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Clear traceability through logging of all access attempts and data transactions is a critical component in preventing security incidents.<\/p>","protected":false},"author":2,"featured_media":73613,"comment_status":"closed","ping_status":"open","sticky":false,"template":"blogg","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_eb_attr":"","inline_featured_image":false,"_uag_custom_page_level_css":"","wpm_timeformat":"","_wpm_styles":"","footnotes":""},"categories":[118],"tags":[177],"class_list":["post-64702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogg","tag-saker-lagring"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e4ker lagring: Del 4 - Complior<\/title>\n<meta name=\"description\" content=\"Tydlig sp\u00e5rbarhet genom loggning av alla \u00e5tkomstf\u00f6rs\u00f6k och datatransaktioner \u00e4r en avg\u00f6randekomponent f\u00f6r att f\u00f6rhindra s\u00e4kerhetsincidenter.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/complior.se\/en\/saker-lagring-del-4\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e4ker lagring: Del 4 - Complior\" \/>\n<meta property=\"og:description\" content=\"Tydlig sp\u00e5rbarhet genom loggning av alla \u00e5tkomstf\u00f6rs\u00f6k och datatransaktioner \u00e4r en avg\u00f6randekomponent f\u00f6r att f\u00f6rhindra s\u00e4kerhetsincidenter.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/complior.se\/en\/saker-lagring-del-4\/\" \/>\n<meta property=\"og:site_name\" content=\"Complior\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-23T05:53:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T22:17:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"595\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kikki Bostrom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kikki Bostrom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/\"},\"author\":{\"name\":\"Kikki Bostrom\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\"},\"headline\":\"S\u00e4ker lagring: Del 4\",\"datePublished\":\"2024-10-23T05:53:44+00:00\",\"dateModified\":\"2026-03-12T22:17:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/\"},\"wordCount\":1116,\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/folder-sharing-online.jpg\",\"keywords\":[\"saker lagring\"],\"articleSection\":[\"Blogg\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/\",\"name\":\"S\u00e4ker lagring: Del 4 - Complior\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/folder-sharing-online.jpg\",\"datePublished\":\"2024-10-23T05:53:44+00:00\",\"dateModified\":\"2026-03-12T22:17:12+00:00\",\"description\":\"Tydlig sp\u00e5rbarhet genom loggning av alla \u00e5tkomstf\u00f6rs\u00f6k och datatransaktioner \u00e4r en avg\u00f6randekomponent f\u00f6r att f\u00f6rhindra s\u00e4kerhetsincidenter.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/#primaryimage\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/folder-sharing-online.jpg\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/folder-sharing-online.jpg\",\"width\":1000,\"height\":595,\"caption\":\"Person working on laptop and looking at online secure file sharing and inspection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/complior.se\\\/saker-lagring-del-4\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/complior.se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e4ker lagring: Del 4\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/complior.se\\\/#website\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"name\":\"Complior\",\"description\":\"Security beyond compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/complior.se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/complior.se\\\/#organization\",\"name\":\"Complior\",\"url\":\"https:\\\/\\\/complior.se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"contentUrl\":\"https:\\\/\\\/complior.se\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/Complior_logo_dark-scaled.png\",\"width\":2560,\"height\":960,\"caption\":\"Complior\"},\"image\":{\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/complior.se\\\/#\\\/schema\\\/person\\\/841f8a57425589a6d7f13c201d345016\",\"name\":\"Kikki Bostrom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g\",\"caption\":\"Kikki Bostrom\"},\"url\":\"https:\\\/\\\/complior.se\\\/en\\\/author\\\/kikki\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e4ker lagring: Del 4 - Complior","description":"Clear traceability through logging of all access attempts and data transactions is a critical component in preventing security incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/complior.se\/en\/saker-lagring-del-4\/","og_locale":"en_GB","og_type":"article","og_title":"S\u00e4ker lagring: Del 4 - Complior","og_description":"Tydlig sp\u00e5rbarhet genom loggning av alla \u00e5tkomstf\u00f6rs\u00f6k och datatransaktioner \u00e4r en avg\u00f6randekomponent f\u00f6r att f\u00f6rhindra s\u00e4kerhetsincidenter.","og_url":"https:\/\/complior.se\/en\/saker-lagring-del-4\/","og_site_name":"Complior","article_published_time":"2024-10-23T05:53:44+00:00","article_modified_time":"2026-03-12T22:17:12+00:00","og_image":[{"width":1000,"height":595,"url":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg","type":"image\/jpeg"}],"author":"Kikki Bostrom","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kikki Bostrom","Estimated reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/complior.se\/saker-lagring-del-4\/#article","isPartOf":{"@id":"https:\/\/complior.se\/saker-lagring-del-4\/"},"author":{"name":"Kikki Bostrom","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016"},"headline":"S\u00e4ker lagring: Del 4","datePublished":"2024-10-23T05:53:44+00:00","dateModified":"2026-03-12T22:17:12+00:00","mainEntityOfPage":{"@id":"https:\/\/complior.se\/saker-lagring-del-4\/"},"wordCount":1116,"publisher":{"@id":"https:\/\/complior.se\/#organization"},"image":{"@id":"https:\/\/complior.se\/saker-lagring-del-4\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg","keywords":["saker lagring"],"articleSection":["Blogg"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/complior.se\/saker-lagring-del-4\/","url":"https:\/\/complior.se\/saker-lagring-del-4\/","name":"S\u00e4ker lagring: Del 4 - Complior","isPartOf":{"@id":"https:\/\/complior.se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/complior.se\/saker-lagring-del-4\/#primaryimage"},"image":{"@id":"https:\/\/complior.se\/saker-lagring-del-4\/#primaryimage"},"thumbnailUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg","datePublished":"2024-10-23T05:53:44+00:00","dateModified":"2026-03-12T22:17:12+00:00","description":"Clear traceability through logging of all access attempts and data transactions is a critical component in preventing security incidents.","breadcrumb":{"@id":"https:\/\/complior.se\/saker-lagring-del-4\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/complior.se\/saker-lagring-del-4\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/saker-lagring-del-4\/#primaryimage","url":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg","width":1000,"height":595,"caption":"Person working on laptop and looking at online secure file sharing and inspection"},{"@type":"BreadcrumbList","@id":"https:\/\/complior.se\/saker-lagring-del-4\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/complior.se\/"},{"@type":"ListItem","position":2,"name":"S\u00e4ker lagring: Del 4"}]},{"@type":"WebSite","@id":"https:\/\/complior.se\/#website","url":"https:\/\/complior.se\/","name":"Complior","description":"Security beyond compliance","publisher":{"@id":"https:\/\/complior.se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/complior.se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/complior.se\/#organization","name":"Complior","url":"https:\/\/complior.se\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/","url":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","contentUrl":"https:\/\/complior.se\/wp-content\/uploads\/2025\/06\/Complior_logo_dark-scaled.png","width":2560,"height":960,"caption":"Complior"},"image":{"@id":"https:\/\/complior.se\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/complior.se\/#\/schema\/person\/841f8a57425589a6d7f13c201d345016","name":"Kikki Bostrom","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3a78a33b10cfcbf5a04f53b522f24d176544c6ab014b5174854b6bb92287e13?s=96&d=mm&r=g","caption":"Kikki Bostrom"},"url":"https:\/\/complior.se\/en\/author\/kikki\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg",1000,595,false],"thumbnail":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online-150x150.jpg",150,150,true],"medium":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online-300x179.jpg",300,179,true],"medium_large":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online-768x457.jpg",768,457,true],"large":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg",1000,595,false],"1536x1536":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg",1000,595,false],"2048x2048":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online.jpg",1000,595,false],"trp-custom-language-flag":["https:\/\/complior.se\/wp-content\/uploads\/2024\/03\/folder-sharing-online-18x12.jpg",18,12,true]},"uagb_author_info":{"display_name":"Kikki Bostrom","author_link":"https:\/\/complior.se\/en\/author\/kikki\/"},"uagb_comment_info":0,"uagb_excerpt":"Tydlig sp\u00e5rbarhet genom loggning av alla \u00e5tkomstf\u00f6rs\u00f6k och datatransaktioner \u00e4r en avg\u00f6randekomponent f\u00f6r att f\u00f6rhindra s\u00e4kerhetsincidenter.","_links":{"self":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/64702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/comments?post=64702"}],"version-history":[{"count":26,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/64702\/revisions"}],"predecessor-version":[{"id":79863,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/posts\/64702\/revisions\/79863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media\/73613"}],"wp:attachment":[{"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/media?parent=64702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/categories?post=64702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/complior.se\/en\/wp-json\/wp\/v2\/tags?post=64702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}