Security logging and monitoring failures rank no.9 on the OWASP Top 10 – and for good reason. If you’re not capturing and reviewing key security events, attackers may breach your system and remain undetected for weeks or even months.
So what does this category include, how is it exploited, and how can you fix it?
–
01 – What are logging and monitoring failures?
This risk covers the failure to detect, record, or respond to suspicious behaviour. Without effective logging and monitoring, malicious activity often goes unnoticed until damage is done.
Some common examples:
Logging isn’t just about collecting data – it’s about detecting breaches and enabling timely response.
–
02 – How is it exploited?
Attackers rely on stealth. If you’re not watching, they’ll take advantage of it.
A classic case: the Target breach (2013). Attackers exfiltrated 40 million payment card records after installing malware on POS systems. Alerts were generated – but not acted on – allowing the breach to persist undetected for weeks.
This isn’t rare. Many organisations only discover they’ve been breached after a third party reports suspicious activity. Poor logging and response dramatically extend attacker dwell time and increase the cost of a breach.
–
03 – How do you prevent it?
The good news: logging and monitoring failures are avoidable with the right practices.
–
Even the most secure systems can be breached – what matters is how quickly you detect and contain the attack. Strong logging and monitoring reduce breach severity by limiting attacker dwell time and enabling effective forensics.
By embedding robust observability, alerting, and response into your architecture, you transform logging from a compliance checkbox into a strategic defence layer.
Posted 26 Mar 25
A regular digest of useful info about Secure by Design – what it is, why it matters, and tips on proactive security.
11 Mar 25
Built in the UK. Securing products worldwide.
Logical Peak Ltd. ©