Skip to content

Latest commit

 

History

History
62 lines (46 loc) · 1.77 KB

a10-insufficient-logging.md

File metadata and controls

62 lines (46 loc) · 1.77 KB

Insufficient Logging and Monitoring

Exploitation of insufficient logging and monitoring is the bedrock of nearly every major incident.

  • Auditable events, such as logins, failed logins, and high-value transactions are not logged.
  • Warnings and errors generate no, inadequate, or unclear log messages.
  • Logs of applications and APIs are not monitored for suspicious activity.
  • Logs are only stored locally.
  • Appropriate alerting thresholds and response escalation processes are not in place or effective.
  • Penetration testing and scans by DAST tools (such as OWASP ZAP) do not trigger alerts.
  • The application is unable to detect, escalate, or alert for active attacks in real time or near real time.

Solution

All critical functionalities of the application must be logged. We use winston, a logging library to handle our logging.

Define a default logger

server.js

var winston = require('winston')
...
winston.configure({
  format: winston.format.json(),
  transports: [
    new winston.transports.File({ filename: 'combined.log' })
  ]
});
...

Log from anywhere

core/passport.js

var winston = requir('winston')
...
if (!isValidPassword(user, password)) {
    winston.log({level:'warn',message:'Failed login attempt for ', username})
    return done(null, false, req.flash('danger', 'Invalid Credentials'))
}
...

Fixes

Implemented in the following files

  • server.js
  • core/passport.js
  • core/authHandler.js

The fix has been implemented in this commit

Recommendation

  • Log all sensitive operations by default
  • Ensure that the logs are stored and processed securely

Reference