Insufficient Attack Protection
Deploying sufficient attack protection is essential to keeping sensitive information safe from hacking attempts. In this module, we’ll discuss web-application requirements regarding detection, prevention and response to both manual and automated attacks.
Insufficient Logging and Monitoring
It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.
OWASP A10 - Insufficient Logging and Monitoring
This module covers insufficient logging and monitoring.