-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
4 changed files
with
55 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
> just log everything | ||
Seems like a good idea. Storage is cheap, logs help debug, and they are useful in incident response, where all information you can get your hands on matters. But logs come with their downsides. Unprotected logs are a treasure trove of information to hackers and provide deep insight into how a system works. | ||
|
||
Everything from event logs, system logs, resource logs can and will be exploited if they fall into the wrong hands. This doesn't only involve external threat actors but internal threats like employees (whatever the reason might be). Logs should be treated like any other protected resource, and companies should follow proper access management protocols to safeguard themselves. | ||
|
||
There is a delicate balance between the amount of logs and their usefulness, and the amount has a point of diminishing returns. Proper alert systems should accompany logs to automate their usefulness. Each organization will have different needs and should adopt a standard logging system to ensure easy management. | ||
|
||
In summary, log what you need to but not needlessly as it increases the attack surface. | ||
There is a cost to logs don't pay with security. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
|
||
<!DOCTYPE html> | ||
<html lang="en"> | ||
<head> | ||
<meta charset="UTF-8"> | ||
|
||
<link rel="stylesheet" href="../css/pico.lime.min.css"> | ||
<title>On Logging</title> | ||
</head> | ||
<body class="container"> | ||
<a href='../index.html'>home</a> | ||
<br> | ||
<h1> | On Logging | </h1> | ||
<hr> | ||
<blockquote> | ||
<p>just log everything </p> | ||
</blockquote> | ||
<p>Seems like a good idea. Storage is cheap, logs help debug, and they are useful in incident response, where all information you can get your hands on matters. But logs come with their downsides. Unprotected logs are a treasure trove of information to hackers and provide deep insight into how a system works.</p> | ||
<p>Everything from event logs, system logs, resource logs can and will be exploited if they fall into the wrong hands. This doesn’t only involve external threat actors but internal threats like employees (whatever the reason might be). Logs should be treated like any other protected resource, and companies should follow proper access management protocols to safeguard themselves.</p> | ||
<p>There is a delicate balance between the amount of logs and their usefulness, and the amount has a point of diminishing returns. Proper alert systems should accompany logs to automate their usefulness. Each organization will have different needs and should adopt a standard logging system to ensure easy management.</p> | ||
<p>In summary, log what you need to but not needlessly as it increases the attack surface. | ||
There is a cost to logs don’t pay with security. </p> | ||
|
||
</body> | ||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,18 @@ | ||
|
||
<!DOCTYPE html> | ||
<html lang="en"> | ||
<head> | ||
<meta charset="UTF-8"> | ||
|
||
<link rel="stylesheet" href="../css/pico.lime.min.css"> | ||
<title>on logging</title> | ||
</head> | ||
<body class="container"> | ||
<a href='../index.html'>home</a> | ||
<br> | ||
<h1> | on logging | </h1> | ||
<hr> | ||
<p>Logging everything seems very useful </p> | ||
|
||
</body> | ||
</html> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters