Fork me on GitHub

Information Gathering -> Logging: Logging of security events

Risk and Opportunity

Risk: No track of security-relevant events makes it harder to analyse an incident.
Opportunity: Security-relevant events like login/logout or creation, change, deletion of users should be logged.

Exploit details

Usefullness: High
Required knowledge: Very Low (one discipline)
Required time: Very Low
Required resources (systems): Very Low

Additional Information

Dependencies: PII logging concept
Implementation hints: rsyslog, logstash, fluentd, bash
OWASP SAMM 2 Mapping: o-incident-management|A|1
ISO27001:2017 Controls Mapping: