A Crash Course in Audit Logs

  Рет қаралды 16,311

DevSecCon

DevSecCon

Күн бұрын

Application audit logs include a breadcrumb trail of all user activity and the logs are used to answer many different questions in a variety of contexts. Development teams perform analytics on the logs. Security teams write threat detection logic on the logs. Customers will arbitrarily request the logs. Government regulations (GDPR, CCPA, etc.) will mandate that you save them, but then eventually delete them. Your responsibility as a developer or security engineer is to make sure the logs are useful and usable by all of these different stakeholders-and that means robust, high-quality log management tooling. In this talk, we’ll explain the purpose and value of audit logs, present a best-practices logging checklist, and break down an all-purpose log reference format that you can use today!
Justin Massey
Justin Massey is a Product Manager at Datadog. His background in managing the technical operations of an MSP led him to discovering weaknesses in many businesses’ networks and applications. After leaving the MSP, he transitioned into the role of penetration tester and application security engineer to identify the weaknesses before the attackers. Justin’s current focus is detecting security threats in real time.

Пікірлер: 5
@MIRIYALAJEEVANKUMARN
@MIRIYALAJEEVANKUMARN 3 жыл бұрын
Well explained
@DuyTran-ss4lu
@DuyTran-ss4lu 2 жыл бұрын
Awesome
@haraheiquedossantos4283
@haraheiquedossantos4283 Жыл бұрын
Hello. Good video. In your opinion, where is the best place to save the audit logs. Do you think save these kind of logs in relational databases is a bad ideia? Because in the long term, it worsens the performance of searching the logs in addition to consuming a large amount of data inside database. Which tool do you think is better tho?
@farhan24fa
@farhan24fa 2 жыл бұрын
I was here
@ajantamoushumi2204
@ajantamoushumi2204 Жыл бұрын
Isnt it a frowned upon to include PII in audit logs? Asking cause your example includes IP address. Sorry, I dont have a technical background, just curious
Audit Logs | What Is An Audit Log? How Do Audit Logs Improve Security? Welcome To 123 CMMC
16:31
Cyber Security with Dana Mantilia
Рет қаралды 4,4 М.
The Best Way To Add Audit Tables to Your Database
8:48
Database Star
Рет қаралды 4,7 М.
THE POLICE TAKES ME! feat @PANDAGIRLOFFICIAL #shorts
00:31
PANDA BOI
Рет қаралды 18 МЛН
Django Logging Demystified with Lee Trout - DjangoCon US 2022
45:08
DjangoCon US
Рет қаралды 1,6 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 592 М.
How to use Cloud Audit Logging
7:01
Google Cloud Tech
Рет қаралды 12 М.
Most Tech Interview Prep is GARBAGE. (From a Principal Engineer at Amazon)
12:57
Cybersecurity Risk Assessment Template: Audit Logs
16:37
AeroCom Inc
Рет қаралды 227
How To Use The Windows Event Viewer For Cyber Security Audit
8:00
What is XDR vs EDR vs MDR?  Breaking down Extended Detection and Response
8:54
The CISO Perspective
Рет қаралды 183 М.
Breaking The Kill Chain: A Defensive Approach
13:18
The CISO Perspective
Рет қаралды 155 М.
Detecting Exploits - OMIGod (Linux Logging with Auditd)
54:08
Day 3: Security Auditing and Compliance
1:09:41
VMware Tanzu
Рет қаралды 13 М.
Спутниковый телефон #обзор #товары
0:35
Product show
Рет қаралды 1,9 МЛН
Ультрабюджетная игровая мышь? 💀
1:00
Best mobile of all time💥🗿 [Troll Face]
0:24
Special SHNTY 2.0
Рет қаралды 1,9 МЛН
Will the battery emit smoke if it rotates rapidly?
0:11
Meaningful Cartoons 183
Рет қаралды 41 МЛН