From the course: Learning the OWASP Top 10
Unlock the full course today
Join today to access over 24,500 courses taught by industry experts.
Security logging and monitoring failures
From the course: Learning the OWASP Top 10
Security logging and monitoring failures
- [Instructor] The ninth item in the 2021 OWASP top 10 is security logging and monitoring failures. OWASP says, "Without logging and monitoring, breaches cannot be detected." When I started my career in this field, I found it somewhat challenging to explain to my friends and family what I do for work. Now, everyone gets it because we see it all the time in mainstream media. Unfortunately, most people have also had their own personal information compromised as the result of a data breach. The ninth item in the OWASP top 10 is rooted in this fundamental belief that security incidents are bound to happen. The thing about security breaches is that it's not all or nothing. Hackers do their work one step at a time, and each step builds upon the previous one. Consider a burglar who's walking down the street, checking car doors to see if someone left their car unlocked. They find one and they get in. In the center console…
Contents
-
-
-
Broken access control4m 37s
-
(Locked)
Cryptographic failures3m
-
(Locked)
Injection4m 19s
-
(Locked)
Insecure design2m 58s
-
(Locked)
Security misconfiguration3m 6s
-
(Locked)
Vulnerable and outdated components3m 2s
-
(Locked)
Identification and authentication failures3m 17s
-
(Locked)
Software and data integrity failures3m 35s
-
(Locked)
Security logging and monitoring failures3m 17s
-
(Locked)
Server-side request forgery (SSRF)1m 43s
-
-