Skip to content

Commit b727500

Browse files
authored
Fixes #132 SCP [121, 124, 125, 126, 127, 128, 129] Cornucopia - Loggi… (#133)
* Fixes #132 SCP [121, 124, 125, 126, 127, 128, 129] Cornucopia - Logging and Monitoring * Fixes: #132 SCP [53] Cornucopia - Logging and Monitoring * Fixes: #132 improve grammer * Fixes: #132 improve grammer
1 parent 783ba34 commit b727500

File tree

1 file changed

+16
-5
lines changed

1 file changed

+16
-5
lines changed

docs/en/04-design/02-web-app-checklist/09-logging-monitoring.md

Lines changed: 16 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,19 @@ and use the list below as suggestions for a checklist that has been tailored for
77

88
#### 1. Security logging
99

10-
1. Log submitted data that is outside of an expected numeric range.
11-
2. Log submitted data that involves changes to data that should not be modifiable
10+
1. Log submitted data that is outside of an expected numeric range
11+
2. Log all apparent tampering events, that involve changes to data and state that should not be modifiable
1212
3. Log requests that violate server-side access control rules
1313
4. Encode and validate any dangerous characters before logging to prevent log injection attacks
14-
5. Do not log sensitive information
14+
5. Do not log sensitive information such as unnecessary system details, session identifiers or passwords
1515
6. Logging controls should support both success and failure of specified security events
16-
7. Do not store sensitive information in logs, including unnecessary system details, session identifiers or passwords
17-
8. Use a cryptographic hash function to validate log entry integrity
16+
7. Use a cryptographic hash function to validate log entry integrity
17+
8. Log attempts to authenticate with invalid or expired credentials
18+
9. Log all input validation failures
19+
10. Log all system exceptions
20+
11. Log all administrative functions, including changes to the security configuration settings
21+
12. Log all backend TLS connection failures
22+
13. Log cryptographic module failures
1823

1924
#### 2. Security logging design
2025

@@ -28,6 +33,12 @@ and use the list below as suggestions for a checklist that has been tailored for
2833
8. All logging controls should be implemented on a trusted system
2934
9. Ensure that a mechanism exists to conduct log analysis
3035

36+
#### 3. Monitoring
37+
38+
1. Effective monitoring and alerting should be established to detect and respond to suspicious activities quickly
39+
2. Account for attack patterns that bypass standard lockouts, such as using the same passwords against multiple user accounts
40+
while rotating IP addresses
41+
3142
#### References
3243

3344
* OWASP [Cheat Sheet: Logging][cslogging]

0 commit comments

Comments
 (0)