Home / Companies / Tyk / Blog / Post Details
Content Deep Dive

OWASP API security – 10: Insufficient logging & monitoring

Blog post from Tyk

Post Details
Company
Tyk
Date Published
Author
Jennifer Craig
Word Count
939
Language
English
Hacker News Points
-
Summary

Insufficient logging and monitoring, while not a direct vulnerability, leaves organizations blind to current and past attacks, making them susceptible to future breaches. Effective logging and monitoring require both application and transaction logs to be secured in separate storage and analytics systems. This ensures that, even if a system is compromised, forensic data remains trustworthy. The Tyk API Gateway enhances data collection by integrating with third-party tools and providing features such as increased log verbosity and real-time event handling. By differentiating but not separating application and transaction logs, organizations can better detect and analyze attacks. It is crucial to maintain synchronized timestamps across systems to aid in correlating attacks and ensure timely alerts for any discrepancies.