Главная
Study mode:
on
1
Intro
2
Who am I
3
Understanding the attack process
4
Unicorn Project and Phoenix Project
5
The 5 philosophies
6
The developers
7
Keep it simple
8
Keep it tagged
9
Keep it cleaned
10
Log accordingly
11
Consider who has access to logs
12
Incident response
13
Be kind to your future
14
Outro
Description:
Discover five essential philosophies for creating more effective application logs in this insightful 23-minute talk by Veronica Schmitt at an OWASP Foundation event. Explore the importance of building forensic and breach readiness into application logs, drawing from real-world experiences with compromised teams and sensitive data disclosures. Learn how to transform developers into "ninja forensic coding logging forces of nature" by implementing strategies that balance information richness with noise reduction. Delve into topics such as understanding the attack process, keeping logs simple and tagged, cleaning log data, implementing appropriate logging practices, considering log access, and preparing for incident response. Gain valuable insights on how to enhance your application's security posture and be better prepared for potential breaches through improved logging techniques.

Five Philosophies for Building Better Application Logs

OWASP Foundation
Add to list