DES 231 - Applying OWASP 2017: Mitigating Insufficient Logging & Monitoring Vulnerabilities


Course Overview

In this course, you will learn how to mitigate the risks associated with insufficient logging and monitoring, as defined by OWASP.

After completing this course, you will understand how to:

  • Ensure all login, access failures, and input validation failures are logged
  • Implement sufficient user context to identify suspicious behavior
  • Allow sufficient time so malicious accounts can be tracked for forensic analysis
  • Apply best practices for secure application logging
Ready to Demo this course? Questions? Contact Us!