Previous Topic

Next Topic

Book Contents

#10 - Insufficient logging and monitoring

Developers should establish effective monitoring and alerting such that suspicious activities are detected and responded to in a timely fashion. Ensure all login, access control failures, and server-side input validation failures can be logged with sufficient user context to identify suspicious or malicious accounts. Ensure that logs are generated in a format that can be easily consumed by a centralized log management solutions.

Send Feedback