The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2010 vol.8)
pp: 82-85
Gunnar Peterson , Arctec Group
ABSTRACT
As threats shift toward applications and as more companies struggle with compliance mandates and the limitation of protection technologies such as access control, the need for useful, comprehensive application logging can only increase. This article provides guidance on application logging to application developers and architects and to security professionals.
INDEX TERMS
application logging, audit logs, debugging logs, cloud computing, security and privacy
CITATION
Anton Chuvakin, Gunnar Peterson, "How to Do Application Logging Right", IEEE Security & Privacy, vol.8, no. 4, pp. 82-85, July/August 2010, doi:10.1109/MSP.2010.127
REFERENCES
1. R. Bejtlich, "Build Visibility In," blog, 13 Aug. 2009; http://taosecurity.blogspot.com/2009/08build-visibility-in.html .
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool