[Owasp-leaders] Application Security Logging Cheat Sheet
colin.watson at owasp.org
Mon Apr 23 21:43:28 UTC 2012
> May I ask (I only scanned the doc) have you included logging of input from external sources
I mention these other possible sources (so far):
"* Client software e.g. actions on desktop software and mobile devices
in local logs or using messaging technologies, web browser such as
using Content Security Policy (CSP) reporting mechanism
* Network firewalls
* Network and host intrusion detection systems (NIDS and HIDS)
* Closely-related applications e.g. filters built into web server
software, web server URL redirects/rewrites to scripted custom error
pages and handlers
* Application firewalls e.g. filters, guards, XML gateways, database
firewalls, web application firewalls (WAFs)
* Database applications e.g. automatic audit trails, trigger-based actions
* Reputation monitoring services e.g. uptime or malware monitoring
* Related applications e.g. fraud monitoring, CRM"
> and validation of such?
The cheat sheet says:
"The degree of confidence in the event information has to be
considered when including event data from systems in a different trust
zone. Data may be missing, modified, forged and could be malicious –
it must always be treated as untrusted data. Consider how the source
can be verified, and how integrity and non-repudiation can be
"* Perform input validation on event data from other trust zones to
ensure it is in the correct format (and consider alerting and not
logging if there is an input validation failure)
* Perform sanitization on all event data to prevent log injection
attacks e.g. carriage return, line feed and delimiter characters (and
optionally to remove sensitive data)
* Encode data correctly for the output (logged) format
* If writing to databases read, understand and apply the SQL
injection cheat sheet"
> Also log scrapers and encoding data to prevent log scraper attacks.
I'm not sure what you mean here? I discuss access control, and for web
applications, not storing logs in web-accessible locations. Should we
add something more?
> (I know this is also crossing into other realms)
> Just a thought :)
All thoughts welcome.
> On 23 Apr 2012, at 21:04, Jim Manico <jim.manico at owasp.org> wrote:
>> Our good friend Colin Watson just finished the first version of the
>> (Security) Logging Cheat Sheet.
>> Please check it out! Any feedback is greatly appreciated.
>> And the cheating continues.... We have several more cheat sheets in the
>> hopper to be released soon.
>> Jim Manico
>> Connections Committee Chair
>> Cheatsheet Series Product Manager
>> OWASP Podcast Producer/Host
>> jim at owasp.org
>> OWASP-Leaders mailing list
>> OWASP-Leaders at lists.owasp.org
More information about the OWASP-Leaders