2021 OWASP Top Ten: Security Logging and Monitoring Failures
by F5 DevCentral
📚 Main Topics
Overview of Security Logging and Monitoring Failures
- Ranked #9 in the 2021 OWASP Top 10 Security Risks.
- Moved up from #10 in the 2017 list.
- Based on survey data and interviews due to challenges in testing and collecting data.
Importance of Sufficient Logging and Monitoring
- Essential to log auditable events (e.g., logins, failed logins, high-value transactions).
- Need for monitoring logs for suspicious activities, especially in APIs.
Backup and Redundancy
- Logs should not only be stored locally but also backed up off-site for disaster recovery.
Alerting and Response Mechanisms
- Establish appropriate alerting thresholds and escalation processes.
- Real-time or near real-time detection of active attacks is crucial.
Real-World Examples of Failures
- Case studies of health plan providers and airlines that suffered data breaches due to inadequate logging and monitoring.
Development and Production Environment Considerations
- Importance of maintaining logging configurations throughout the development lifecycle (staging, QA, production).
Best Practices for Effective Logging and Monitoring
- Ensure logging of login attempts, access control failures, and server-side input validation.
- Maintain logs long enough for forensic analysis.
- Format logs for easy consumption by log management solutions.
- Encode log data correctly to prevent injection attacks.
Establishing Incident Response Plans
- Importance of having a recovery plan in place for when attacks occur.
✨ Key Takeaways
- Security logging and monitoring failures remain a significant risk in application security.
- Organizations must prioritize logging and monitoring to detect and respond to security incidents effectively.
- Proper configuration and maintenance of logging practices are essential throughout the software development lifecycle.
- Real-time monitoring and alerting can significantly reduce the impact of security breaches.
🧠Lessons Learned
- Logging is not just about collecting data; it requires active monitoring and analysis.
- Organizations should not rely solely on third-party services for logging and monitoring; they must implement their own robust systems.
- Continuous improvement and regular audits of logging practices can help mitigate risks associated with security failures.