Skip to content

Logging and Exception Handling

Catalog Module

Published on

This module examines how audit records track both legitimate user and attacker activity. We explore the threats and weaknesses of logging, events to log, data to exclude from logs and design principles to improve logging. Without proper logging, it is impossible to investigate an application compromise or data breach. Without stable exception handling, applications behave in unknown and unspecified ways.