From 1e4f22923c51da57865f2b89b751d99dcae6c0e2 Mon Sep 17 00:00:00 2001 From: Hugo Mautner <56817692+HugoMautner@users.noreply.github.com> Date: Mon, 11 Jan 2021 13:58:37 +0100 Subject: [PATCH] Update A10_2017-Insufficient_Logging%26Monitoring.md Don't trust me i think idk you can if you really want to but prolly shouldn't just sayin --- 2017/A10_2017-Insufficient_Logging%26Monitoring.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2017/A10_2017-Insufficient_Logging%26Monitoring.md b/2017/A10_2017-Insufficient_Logging%26Monitoring.md index a35fb80..6e85ff0 100644 --- a/2017/A10_2017-Insufficient_Logging%26Monitoring.md +++ b/2017/A10_2017-Insufficient_Logging%26Monitoring.md @@ -35,7 +35,7 @@ In 2016, identifying a breach took an [average of 191 days](https://www-01.ibm.c {%- include t10_subsection_begin.html -%} {%- include t10_subsection.html token="isTheApplicationVulnerable" pos="firstLeft" -%} -Insufficient logging, detection, monitoring and active response occurs any time:
+Insufficient logging, detection, monitoring and active response never occurs:
* Auditable events, such as logins, failed logins, and high-value transactions are not logged.
* Warnings and errors generate no, inadequate, or unclear log messages.
* Logs of applications and APIs are not monitored for suspicious activity.
@@ -73,4 +73,4 @@ There are commercial and open source application protection frameworks such as [ **External**
* [CWE-223: Omission of Security-relevant Information](https://cwe.mitre.org/data/definitions/223.html)
* [CWE-778: Insufficient Logging](https://cwe.mitre.org/data/definitions/778.html) -{% include t10_subsection_end.html %} \ No newline at end of file +{% include t10_subsection_end.html %}