Deepshikha Paty
DI-ASM


Access the lab


What is Insufficient Logging and Monitoring?

How does it happen?


Example : Silent Brute Force Attack

Example

Imagine a bank's website:

  • A hacker tries to log in with 1000 different passwords (brute force).
  • The system doesn’t log these failed attempts.
  • There's no alert to the security team.

Result: The attacker eventually logs in — and no one notices until it’s too late.


Real-world consequences:


🎯 Why it matters:


✅ Good Logging and Monitoring should:

  1. Log important events, like:

    • Failed logins
    • Access to sensitive data
    • Changes in user roles or settings
  2. Alert the security team in real-time

  3. Store logs safely so attackers can’t delete them

  4. Use SIEM tools (like Splunk, ELK, etc.) to analyze logs