OWASP API Security: Sufficient Logging and Monitoring for API Protection
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Learn about the critical importance of sufficient logging and monitoring for API security in this informative conference talk. Explore real-world examples and discover five effective strategies to implement robust logging and monitoring practices for APIs. Gain insights into creating a verifiable trail of API calls for auditing, security, and observability purposes. Understand the challenges of working with sensitive data, learn about security and privacy techniques, and identify common antipatterns to avoid. Discover how proper logging and monitoring can benefit various stages of the software development lifecycle and help prevent potential security breaches.
Syllabus
Introduction
What is A10
Why does this matter
Is this problem getting worse
A10 Official Recommendations
Challenges
Best practices
Benefits across the software development lifecycle
Why is sufficient logging and monitoring important
Triggering feelings
Challenges of working with PHI
Security and privacy techniques
Software development life cycle
Antipatterns
No PII here strategy
Strategies
Taught by
OWASP Foundation
Related Courses
Introduction to Data Analytics for BusinessUniversity of Colorado Boulder via Coursera Digital and the Everyday: from codes to cloud
NPTEL via Swayam Systems and Application Security
(ISC)² via Coursera Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera