A Crash Course in Audit Logs
Application audit logs include a breadcrumb trail of all user activity and the logs are used to answer many different questions in a variety of contexts. Development teams perform analytics on the logs. Security teams write threat detection logic on the logs. Customers will arbitrarily request the logs. Government regulations (GDPR, CCPA, etc.) will mandate that you save them, but then eventually delete them. Your responsibility as a developer or security engineer is to make sure the logs are useful and usable by all of these different stakeholders—and that means robust, high-quality log management tooling. In this talk, we’ll explain the purpose and value of audit logs, present a best-practices logging checklist, and break down an all-purpose log reference format that you can use today!
Justin Massey
Justin Massey is a Product Manager at Datadog. His background in managing the technical operations of an MSP led him to discovering weaknesses in many businesses’ networks and applications. After leaving the MSP, he transitioned into the role of penetration tester and application security engineer to identify the weaknesses before the attackers. Justin’s current focus is detecting security threats in real time.
Видео A Crash Course in Audit Logs канала DevSecCon -
Justin Massey
Justin Massey is a Product Manager at Datadog. His background in managing the technical operations of an MSP led him to discovering weaknesses in many businesses’ networks and applications. After leaving the MSP, he transitioned into the role of penetration tester and application security engineer to identify the weaknesses before the attackers. Justin’s current focus is detecting security threats in real time.
Видео A Crash Course in Audit Logs канала DevSecCon -
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Understanding audit logsIntro to Falco: Intrusion Detection for Containers - Shane Lawrence, ShopifyWhat Is An Audit Trail and Why Is It Important?What does it feel like to be a CISO for a day?Distributed Logging System Design | Distributed Logging in Microservices | Systems Design Interview🔴Monitoring Machines & Servers With PDQ Inventory PowerShell Scanner - Part IIriusRisk Tutorial Series - Video 1 - Getting StartedViewing Method Audit Trails and Method Differences in EmpowerHow to use Cloud Audit LoggingIngest, Analyze, and Manage Your Logs with OCI Logging by Mohamed SleemAuditd TutorialPart 012. Microsoft Threat Modeling Practical session | UCSCDashboards vs. ReportsJava Logs and Audit to Kafka via LoggingIT Audit Introduction PART 1Question: Is it Better to Go Into Networking or Development?How To Use The Windows Event Viewer For Cyber Security AuditWhat is ERP softwareLearning Awk Is Essential For Linux UsersCollege fees management system in python (django)