OWASP A09:2021 - Security Logging and Monitoring Failures
Overview
Common Failure Scenarios
1. Insufficient Logging
2. Inadequate Log Content
3. Poor Log Management
4. Ineffective Monitoring
Impact on Penetration Testing
What This Means for Pentesters
Red Team Implications
Detection During Assessment
Reconnaissance Phase
Application Testing
Log Injection Testing
Manual Testing Methodology
1. Log Coverage Assessment
2. Log Content Analysis
3. Sensitive Data in Logs
Common Vulnerable Patterns
Insufficient Error Logging
Missing Security Event Logging
Sensitive Data Exposure in Logs
Exploitation Techniques
Log Injection Attacks
Log Poisoning
Information Disclosure via Logs
Assessment Tools
Log Analysis Tools
Automated Testing Scripts
Testing Checklist
Log Coverage Assessment
Log Content Quality
Log Security
Monitoring and Alerting
Common Log Locations by Technology
Web Servers
Applications
Databases
Mitigation Strategies
Implement Comprehensive Logging
Secure Log Management
Real-time Monitoring
Red Flags During Assessment
High Priority Issues
Medium Priority Issues
Business Impact Analysis
Immediate Risks
Long-term Consequences
Tools for Detection and Testing
Open Source
Commercial
PreviousOWASP A08:2021 - Software and Data Integrity FailuresNextOWASP A10:2021 - Server-Side Request Forgery (SSRF)
Last updated