6. of Repudiation II
An attacker can create a log entry without a timestamp (or no log entry is timestamped).
Threat |
|
Your log appender pattern doesn’t include a timestamp. Timestamps are important because they allow you to correlate logs between different parts of your system, but they also allow you to see whether log entries are missing because there would be a break in the continuity of the entries. |
|
CAPEC |
CAPEC-268 - Audit Log Manipulation |
ASVS |
7.1.4 - Ensure log entries are sufficiently complete for forensics to reconstruct the chain of events. |
CWE |
CWE-223 - Omission of Security-Relevant Information |
Mitigations |
|