misconfigured_log_retention

Misconfigured Log Retention

TLDR: Misconfigured log retention policies can lead to vulnerabilities such as data leakage, loss of critical forensic data, and regulatory compliance failures. These issues arise from excessive retention, insufficient retention, or improper deletion practices, violating several OWASP Top Ten principles, including secure Logging, Access Controls, and data lifecycle management.

https://owasp.org/www-community/Logging_and_Monitoring_Cheat_Sheet

Excessive log retention increases the attack surface by storing sensitive data longer than necessary. For example, logs containing personal information or credentials could be exposed during a breach. Implementing tailored retention policies aligned with regulatory requirements ensures compliance with OWASP Top Ten's Data Encryption and data handling principles.

https://owasp.org/www-community/Data_Encryption

Failing to retain logs for sufficient periods can hinder forensic investigations or compliance with regulations such as GDPR or HIPAA. Defining appropriate retention durations based on legal, operational, and security requirements aligns with OWASP Top Ten best practices for operational resilience.

https://owasp.org/www-community/OWASP_Proactive_Controls

Improper access controls on archived logs can result in unauthorized access. For instance, attackers exploiting weak permissions could access sensitive historical data. Enforcing strict role-based access to archived logs complies with OWASP Top Ten's Access Management standards.

https://owasp.org/www-community/Access_Control

Inadequate handling of log rotation and archival can result in overwritten or lost log data. Implementing secure rotation mechanisms ensures critical logs are preserved without consuming excessive storage, aligning with OWASP Top Ten resource management principles.

https://owasp.org/www-community/Denial_of_Service

Failing to encrypt retained logs increases the risk of exposure if storage systems are compromised. Encrypting logs both at rest and in transit ensures compliance with OWASP Top Ten's Data Encryption and secure Logging practices.

https://owasp.org/www-community/Data_Encryption

Neglecting to monitor access or modifications to archived logs undermines their security. Integrating log access monitoring into SIEM systems ensures compliance with OWASP Top Ten's focus on proactive monitoring and anomaly detection.

https://owasp.org/www-community/Logging_and_Monitoring_Cheat_Sheet

Improper deletion practices, such as failing to securely erase logs after their retention period, increase the risk of data leakage during breaches or audits. Adopting secure deletion mechanisms ensures alignment with OWASP Top Ten lifecycle management recommendations.

https://owasp.org/www-community/OWASP_Proactive_Controls

Over-reliance on default log retention configurations often results in excessive or insufficient retention periods. Customizing retention policies based on the organization's threat model and regulatory requirements complies with OWASP Top Ten's secure Framework Defaults principles.

https://owasp.org/www-community/Framework_Security_Project

Logging unvalidated user inputs in retained logs can lead to code injection vulnerabilities during log analysis or debugging. Sanitizing and validating all logged data aligns with OWASP Top Ten's Input Validation best practices.

https://owasp.org/www-community/Input_Validation

Finally, failing to segregate log retention policies for production and development environments can lead to accidental exposure of debug information in production logs. Adopting environment-specific retention policies ensures adherence to OWASP Top Ten operational best practices.

https://owasp.org/www-community/OWASP_Proactive_Controlsa

misconfigured_log_retention.txt · Last modified: 2025/02/01 06:41 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki