This weakness occurs when an application fails to properly record important security events or captures them with insufficient detail, making it hard to spot and investigate suspicious activity.
Insufficient logging creates blind spots for security teams. When critical events—like failed logins, privilege escalations, or data access—aren't logged with enough detail, detecting attacks in progress becomes nearly impossible. This also severely hampers post-incident forensic analysis, leaving you without the evidence needed to understand how a breach happened or what data was affected. Modern cloud environments often introduce this risk through misconfiguration. Cloud services frequently have detailed logging disabled by default to manage costs and performance. If developers don't explicitly enable and configure audit logs for services like storage buckets, databases, or identity management, critical telemetry gaps appear. These gaps in your security logs can allow malicious activity to go completely unnoticed.
Impact: Hide Activities
If security critical information is not recorded, there will be no trail for forensic analysis and discovering the cause of problems or the source of attacks may become more difficult or impossible.
xmlxmljavajavashellshellshellMedium