@@ -7,14 +7,19 @@ and use the list below as suggestions for a checklist that has been tailored for
77
88#### 1. Security logging
99
10- 1 . Log submitted data that is outside of an expected numeric range.
11- 2 . Log submitted data that involves changes to data that should not be modifiable
10+ 1 . Log submitted data that is outside of an expected numeric range
11+ 2 . Log all apparent tampering events, that involve changes to data and state that should not be modifiable
12123 . Log requests that violate server-side access control rules
13134 . Encode and validate any dangerous characters before logging to prevent log injection attacks
14- 5 . Do not log sensitive information
14+ 5 . Do not log sensitive information such as unnecessary system details, session identifiers or passwords
15156 . Logging controls should support both success and failure of specified security events
16- 7 . Do not store sensitive information in logs, including unnecessary system details, session identifiers or passwords
17- 8 . Use a cryptographic hash function to validate log entry integrity
16+ 7 . Use a cryptographic hash function to validate log entry integrity
17+ 8 . Log attempts to authenticate with invalid or expired credentials
18+ 9 . Log all input validation failures
19+ 10 . Log all system exceptions
20+ 11 . Log all administrative functions, including changes to the security configuration settings
21+ 12 . Log all backend TLS connection failures
22+ 13 . Log cryptographic module failures
1823
1924#### 2. Security logging design
2025
@@ -28,6 +33,12 @@ and use the list below as suggestions for a checklist that has been tailored for
28338 . All logging controls should be implemented on a trusted system
29349 . Ensure that a mechanism exists to conduct log analysis
3035
36+ #### 3. Monitoring
37+
38+ 1 . Effective monitoring and alerting should be established to detect and respond to suspicious activities quickly
39+ 2 . Account for attack patterns that bypass standard lockouts, such as using the same passwords against multiple user accounts
40+ while rotating IP addresses
41+
3142#### References
3243
3344* OWASP [ Cheat Sheet: Logging] [ cslogging ]
0 commit comments