How to do it...

  1. .Ensure that no sensitive or personally identifiable information of users or the company (real names, addresses, passwords, credit card information, phone numbers, and so on ) is logged.
  1. Additional to application-specific operations and events, log all operations related to user and account management, for example, creation and deletion of users, password change, change of privilege level, login attempts, and logouts.
  2. Ensure that all logs contain enough context of the event, date and time up to milliseconds, user generating the event, system environment conditions relevant to the event, and entities involved, such as database records, modules, other users, and client used.
  3. Implement a centralized system for gathering, processing, and analyzing logs and generating security alerts based on that analysis (Security Information and Event Management (SIEM)).
  4. Have a team dedicated to monitor and respond to security incidents.
  5. Implement incident response and incident recovery plans so that when an attack is detected or a security breach occurs, you have a standardized procedure to follow in order to recover as fast as possible.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.116.60.62