Transcript
Dave Wickers (0:02)
You're listening to the Cyberwire Network, powered.
Rick Howard (0:04)
By N2K.
Dave Wickers (0:14)
And now a word from our sponsor, ThreatLocker keeping your system secure shouldn't mean constantly reacting to threats. ThreatLocker helps you take a different approach by giving you full control over what software can run in your environment. If it's not approved, it doesn't run. Simple as that. It's a way to stop ransomware and other attacks before they start without adding extra complexity to your day. See how ThreatLocker can help you lock down your environment at www.threatlocker.com.
Rick Howard (0:54)
The word is OWASP Security logging and monitoring Fail spelled O for open, W for Web, A for application, S for security P for project and security logging for collecting security telemetry from applications Monitoring for reviewing and analyzing logs looking for malicious activity and failures for actions not meeting a desirable objective definition the absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system. Example sentence There is no direct vulnerability that can arise due to security logging and monitoring failures, but insufficient planning here can directly impact visibility, incident alerting, and forensics. Origin and context Dave Wickers and Jeff Williams, working for Aspect Security, a software consultant company, published an education piece in 2003 on the top software security coding issues of the day that eventually turned into the OWASP Top 10, a reference document describing the most critical security concerns for Web applications. Today, OWASP is an international team of security professionals and led by the foundation executive director and top 10 project leader Andrew van der Stock, and dedicated to enabling organizations to develop, purchase, and maintain applications and APIs that can be trusted. Today there are tens of thousands of members and hundreds of chapters worldwide. In the 2021 version of the top 10 list, the committee moves security logging and monitoring failures up one spot to number nine. Logging failures most often occur when auditable events are not logged at all, are only logged locally, or are logged in a way that is inadequate or unclear. Precise logging doesn't prevent the success of cyber adversaries, but without it, network defenders have little chance to detect and respond. Auditable events could include things like detection for brute force, password attacks, data exfiltration, and tracking high value transactions, just to name three. If you find yourself at a loss for deciding what auditable events to monitor, have a red team try their hand at compromising the system and devise alerts based on their successes. Nerd reference in 2017, John Wagnon, a solutions architect at F5 Networks, presented his thoughts on insufficient logging and monitoring in a YouTube video. He pointed out that it's not enough to simply log events, you also have to actually monitor the logs for potential issues.
![OWASP security logging and monitoring failures (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F1eb3d200-373c-11f0-a844-032b2db7a062%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)