YoVDO

Five Philosophies for Building Better Application Logs

Offered By: OWASP Foundation via YouTube

Tags

Cybersecurity Courses Software Development Courses Incident Response Courses Data Privacy Courses Log Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover five essential philosophies for creating more effective application logs in this insightful 23-minute talk by Veronica Schmitt at an OWASP Foundation event. Explore the importance of building forensic and breach readiness into application logs, drawing from real-world experiences with compromised teams and sensitive data disclosures. Learn how to transform developers into "ninja forensic coding logging forces of nature" by implementing strategies that balance information richness with noise reduction. Delve into topics such as understanding the attack process, keeping logs simple and tagged, cleaning log data, implementing appropriate logging practices, considering log access, and preparing for incident response. Gain valuable insights on how to enhance your application's security posture and be better prepared for potential breaches through improved logging techniques.

Syllabus

Intro
Who am I
Understanding the attack process
Unicorn Project and Phoenix Project
The 5 philosophies
The developers
Keep it simple
Keep it tagged
Keep it cleaned
Log accordingly
Consider who has access to logs
Incident response
Be kind to your future
Outro


Taught by

OWASP Foundation

Related Courses

Introduction to Data Analytics for Business
University of Colorado Boulder via Coursera
Digital and the Everyday: from codes to cloud
NPTEL via Swayam
Systems and Application Security
(ISC)² via Coursera
Protecting Health Data in the Modern Age: Getting to Grips with the GDPR
University of Groningen via FutureLearn
Teaching Impacts of Technology: Data Collection, Use, and Privacy
University of California, San Diego via Coursera