InformationGathering -> Logging: Logging of security events
Risk and Opportunity
Risk: No track of security-relevant events makes it harder to analyze an incident.
Opportunity: Security-relevant events like login/logout or creation, change, deletion of users should be logged.
Usefulness and Requirements of this Activitiy
Required knowledge: Very Low (one discipline)
Required time: Very Low
Required resources (systems): Very Low
Dependencies: PII logging concept
- rsyslog, , Tags:
- logstash, , Tags:
- fluentd, , Tags:
- bash, , Tags:
OWASP SAMM VERSION 2