This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
How to Do Application Logging Right
July/August 2010 (vol. 8 no. 4)
pp. 82-85
As threats shift toward applications and as more companies struggle with compliance mandates and the limitation of protection technologies such as access control, the need for useful, comprehensive application logging can only increase. This article provides guidance on application logging to application developers and architects and to security professionals.

1. R. Bejtlich, "Build Visibility In," blog, 13 Aug. 2009; http://taosecurity.blogspot.com/2009/08build-visibility-in.html .

Index Terms:
application logging, audit logs, debugging logs, cloud computing, security and privacy
Citation:
Anton Chuvakin, Gunnar Peterson, "How to Do Application Logging Right," IEEE Security & Privacy, vol. 8, no. 4, pp. 82-85, July-Aug. 2010, doi:10.1109/MSP.2010.127
Usage of this product signifies your acceptance of the Terms of Use.