When a malicious insider with authentic reasons for querying databases, accessing applications, modifying
system configurations, and obfuscate records, organizations are left powerless to detect what happened. Hence,
details of logging of user access are essential for securing and preventing data breach/theft.
Log monitoring is considered important for several reasons. One of the reasons includes Log monitoring can
prevent downtime on your sites and servers. Log management tools analyze logs and find problems within them,
allowing your site reliability engineers to spend more time-solving problems and less time searching for them
or responding in emergencies. Log monitoring can save your company valuable time and money.
Returning to the OWASP Top 10 2021, this category is to help detect, escalate, and respond to active breaches. Without logging and monitoring, breaches cannot be detected. Insufficient logging, detection, monitoring, and active response occurs any time:
You are vulnerable to information leakage by making logging and alerting events visible to a user or an attacker (see [A01:2021-Broken Access Control] ).
Developers should implement some or all the following controls, depending on the risk of the application:
There are commercial and open-source application protection frameworks such as the OWASP ModSecurity Core Rule Set, and open-source log correlation software, such as the Elasticsearch, Logstash, Kibana (ELK) stack, that feature custom dashboards and alerting.
Scenario: A children's health plan provider's website operator couldn't detect a breach due to a lack of monitoring and logging. An external party informed the health plan provider that an attacker had accessed and modified thousands of sensitive health records of more than 3.5 million children. A post-incident review found that the website developers had not addressed significant vulnerabilities. As there was no logging or monitoring of the system, the data breach could have been in progress since 2013, a period of more than seven years.