Summary
You’ve now covered the threat types described on the cards from the Repudiation suit in the Elevation of Privilege card deck with the addition of four cards from the T.R.I.M. extension for the game. These threats detailed flaws relating to insufficient logging, excessive logging, logging the wrong content, integrity of the logs, file permissions, and network connectivity.
You should now understand how the confidentiality, integrity, and availability of logs can be affected by a variety of different threats. Having a greater awareness of the threats in this category and having discussed how to mitigate them, you are now armed with the tools you need to ensure that, if something does go wrong, you have what you need to audit the events that led up to the issue.
In the next chapter, we will cover the fourth S.T.R.I.D.E. category of threats, Information Disclosure.