SlideShare a Scribd company logo
LOGGING
Security Mechanism:
Authentication
Authorization
Session Management
Data Validation
Error Handling
Logging
Encryption
Logging Core Concepts
What happened?
Who was doing what, when & where?
important to have an application log
in addition to the server log
Not just bugs & error events…
Determine what security events should be auditable.
For example:
• Use of administrative functions
• Login success & failures
• Password reset attempts
• Password changes
Logging Words to Live By
 Avoid logging sensitive data (e.g., passwords)
 Beware of logging tainted data to the logs
 Beware of logging excessive data
 Beware of potential log spoofing
Logging Words to Live By: #1
 The problem
– Information written to log files can be of a sensitive nature and give
valuable guidance to an attacker or expose sensitive user
information.
Avoid logging sensitive data (e.g., passwords)
Real World Example – Logging Sensitive Data
Secure Coding …
 Consider seriously the sensitivity of the information written
into log files. Do not write secrets into the log files.
– Passwords
– Credit card information
– Trade secrets
– Social security number
– Medical data
Logging Words to Live By: #2
 The problem
– The software does not neutralize or incorrectly neutralizes output
that is written to logs.
Beware logging tainted data to the logs
Logging Words to Live By: #3
 The problem
– The software logs too much information, making log files hard to
process and possibly hindering recovery efforts or forensic analysis
after an attack.
Beware of logging excessive data
Logging Words to Live By: #4
 The problem
– The software uses CRLF (carriage return line feeds) as a special
element, e.g., to separate lines or records, but it does neutralize or
incorrectly neutralizes CRLF sequences from inputs.
Beware of potential log spoofing
Real World Example – Log Spoofing
CVE-2006-4624:
Secure Coding …
 Appropriately filter or quote CRLF sequences in user-
controlled input.
1 string streetAddress = request.getParameter("streetAddress"));
2
3 if (streetAddress.length() > 150) error();
4 streetAddress = RemoveCarriageReturns(streetAddress);
5
6 logger.info("User's street address: " + streetAddress);

More Related Content

PDF
MITRE ATT&CK and 2017 FSB Indictment
PDF
Mitre ATTACK and the North Korean Regime-Backed Programmer
PPTX
Covert channels: A Window of Data Exfiltration Opportunities
PPTX
Ethical Hacking
PDF
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
PPT
Ethical hacking
PPT
Ethical Hacking
PPT
Introduction to Hacking
MITRE ATT&CK and 2017 FSB Indictment
Mitre ATTACK and the North Korean Regime-Backed Programmer
Covert channels: A Window of Data Exfiltration Opportunities
Ethical Hacking
Mitre ATT&CK and the Mueller GRU Indictment: Lessons for Organizations
Ethical hacking
Ethical Hacking
Introduction to Hacking

What's hot (20)

PPT
Computer Systems Security
PDF
Mobile App Security - Best Practices
PDF
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
PPTX
Types of Malware (CEH v11)
PDF
Point-Of-Sale Hacking - 2600Thailand#20
PPT
Ethical hacking
PDF
Ethical hacking
PPT
Ethical Hacking
PPTX
What's new in​ CEHv11?
PPTX
Automating cybersecurity
PPTX
Protection from hacking attacks
PPTX
Ethical Hacking
PDF
Ransomware protection
PPTX
Incident Response: Validation, Containment & Forensics
PPTX
HACKERS ATTACK PROCESS
PPTX
Mis security system threads
PPT
Ch8ed12romney
PDF
Siem requirement.pdfsd
PPTX
Data security
PPT
Ethical hacking by shivam
Computer Systems Security
Mobile App Security - Best Practices
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Types of Malware (CEH v11)
Point-Of-Sale Hacking - 2600Thailand#20
Ethical hacking
Ethical hacking
Ethical Hacking
What's new in​ CEHv11?
Automating cybersecurity
Protection from hacking attacks
Ethical Hacking
Ransomware protection
Incident Response: Validation, Containment & Forensics
HACKERS ATTACK PROCESS
Mis security system threads
Ch8ed12romney
Siem requirement.pdfsd
Data security
Ethical hacking by shivam
Ad

Viewers also liked (20)

PDF
Web Application Security 101 - 12 Logging
PPTX
Docker Indy Meetup Monitoring 30-Aug-2016
PPTX
Elastic - ELK, Logstash & Kibana
PDF
Real-time data analysis using ELK
PPTX
SNMP Demystified Part-I
PPTX
SNMP Demystified Part-II
PPT
Monitor and manage everything Cisco using OpManager
PPTX
Monitoring Docker with ELK
PPTX
PPTX
Desmitificando SNMP
PPTX
SOC2016 - The Investigation Labyrinth
PDF
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
PPTX
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
PPT
Using Canary Honeypots for Network Security Monitoring
PPTX
ELK at LinkedIn - Kafka, scaling, lessons learned
PPT
Applied Detection and Analysis with Flow Data - SO Con 2014
PPT
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
PPTX
Art into Science 2017 - Investigation Theory: A Cognitive Approach
PDF
CCNAv5 - S4: Chapter8 monitoring the network
Web Application Security 101 - 12 Logging
Docker Indy Meetup Monitoring 30-Aug-2016
Elastic - ELK, Logstash & Kibana
Real-time data analysis using ELK
SNMP Demystified Part-I
SNMP Demystified Part-II
Monitor and manage everything Cisco using OpManager
Monitoring Docker with ELK
Desmitificando SNMP
SOC2016 - The Investigation Labyrinth
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
Using ELK-Stack (Elasticsearch, Logstash and Kibana) with BizTalk Server
Using Canary Honeypots for Network Security Monitoring
ELK at LinkedIn - Kafka, scaling, lessons learned
Applied Detection and Analysis with Flow Data - SO Con 2014
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
Art into Science 2017 - Investigation Theory: A Cognitive Approach
CCNAv5 - S4: Chapter8 monitoring the network
Ad

Similar to 09 application security fundamentals - part 2 - security mechanisms - logging (20)

PPTX
Cm4 secure code_training_1day_error handling and logging
PPT
Six Mistakes of Log Management 2008
PPTX
Security Practices - Logging.pptx
PDF
Annual OktCyberfest 2019
PDF
When Security Tools Fail You
PDF
Web security uploadv1
PPTX
Designing and Implementing Effective Logging Strategies
PPTX
Uwvwwbwbwbwbwbwbwbnit-4 - web security.pptx
PPT
oiqwjrfoijqwwieoefmklqwmefioqjweeifmqwklefmqwef
PPTX
How to Test for The OWASP Top Ten
PDF
Serverless Security Checklist
PPTX
Security Operation Center Presentat.pptx
PDF
Unit 3 Significance of Log File Analysis in Pentesting.pdf
PPTX
EventLog Analyzer - Product overview
PPTX
Log maintenance network securiy
PPTX
Power of logs: practices for network security
PDF
Data Protection In eCommerce Store Development_ Essential Technical Best Prac...
PPTX
Owasp Top 10 2017
PPT
Survey Presentation About Application Security
PPTX
Security Operation Center Presentat.pptx
Cm4 secure code_training_1day_error handling and logging
Six Mistakes of Log Management 2008
Security Practices - Logging.pptx
Annual OktCyberfest 2019
When Security Tools Fail You
Web security uploadv1
Designing and Implementing Effective Logging Strategies
Uwvwwbwbwbwbwbwbwbnit-4 - web security.pptx
oiqwjrfoijqwwieoefmklqwmefioqjweeifmqwklefmqwef
How to Test for The OWASP Top Ten
Serverless Security Checklist
Security Operation Center Presentat.pptx
Unit 3 Significance of Log File Analysis in Pentesting.pdf
EventLog Analyzer - Product overview
Log maintenance network securiy
Power of logs: practices for network security
Data Protection In eCommerce Store Development_ Essential Technical Best Prac...
Owasp Top 10 2017
Survey Presentation About Application Security
Security Operation Center Presentat.pptx

More from appsec (12)

PPTX
23 owasp top 10 - resources
PPTX
15 owasp top 10 - a3-xss
PPTX
12 owasp top 10 - introduction
PPTX
10 application security fundamentals - part 2 - security mechanisms - encry...
PPTX
11 application security fundamentals - part 2 - security mechanisms - summary
PPTX
08 application security fundamentals - part 2 - security mechanisms - error...
PPTX
06 application security fundamentals - part 2 - security mechanisms - sessi...
PPTX
07 application security fundamentals - part 2 - security mechanisms - data ...
PPTX
04 application security fundamentals - part 2 - security mechanisms - authe...
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
PPTX
02 application security fundamentals - part 1 - security priciples
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
23 owasp top 10 - resources
15 owasp top 10 - a3-xss
12 owasp top 10 - introduction
10 application security fundamentals - part 2 - security mechanisms - encry...
11 application security fundamentals - part 2 - security mechanisms - summary
08 application security fundamentals - part 2 - security mechanisms - error...
06 application security fundamentals - part 2 - security mechanisms - sessi...
07 application security fundamentals - part 2 - security mechanisms - data ...
04 application security fundamentals - part 2 - security mechanisms - authe...
05 application security fundamentals - part 2 - security mechanisms - autho...
02 application security fundamentals - part 1 - security priciples
01 Application Security Fundamentals - part 1 - introduction and goals

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation theory and applications.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4
Diabetes mellitus diagnosis method based random forest with bat algorithm
Big Data Technologies - Introduction.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

09 application security fundamentals - part 2 - security mechanisms - logging

  • 2. Logging Core Concepts What happened? Who was doing what, when & where? important to have an application log in addition to the server log Not just bugs & error events… Determine what security events should be auditable. For example: • Use of administrative functions • Login success & failures • Password reset attempts • Password changes
  • 3. Logging Words to Live By  Avoid logging sensitive data (e.g., passwords)  Beware of logging tainted data to the logs  Beware of logging excessive data  Beware of potential log spoofing
  • 4. Logging Words to Live By: #1  The problem – Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information. Avoid logging sensitive data (e.g., passwords)
  • 5. Real World Example – Logging Sensitive Data
  • 6. Secure Coding …  Consider seriously the sensitivity of the information written into log files. Do not write secrets into the log files. – Passwords – Credit card information – Trade secrets – Social security number – Medical data
  • 7. Logging Words to Live By: #2  The problem – The software does not neutralize or incorrectly neutralizes output that is written to logs. Beware logging tainted data to the logs
  • 8. Logging Words to Live By: #3  The problem – The software logs too much information, making log files hard to process and possibly hindering recovery efforts or forensic analysis after an attack. Beware of logging excessive data
  • 9. Logging Words to Live By: #4  The problem – The software uses CRLF (carriage return line feeds) as a special element, e.g., to separate lines or records, but it does neutralize or incorrectly neutralizes CRLF sequences from inputs. Beware of potential log spoofing
  • 10. Real World Example – Log Spoofing CVE-2006-4624:
  • 11. Secure Coding …  Appropriately filter or quote CRLF sequences in user- controlled input. 1 string streetAddress = request.getParameter("streetAddress")); 2 3 if (streetAddress.length() > 150) error(); 4 streetAddress = RemoveCarriageReturns(streetAddress); 5 6 logger.info("User's street address: " + streetAddress);