Store
Insufficient Logging & Monitoring
In order to track and detect data breaches, organizations need to log events like attack footprints, surfaces and timestamps that are of interest to them in the context of their web application.
It has been observed that the average discovery time for a security breach is more than 200 days after it has happened, giving attackers plenty of time to intensify the attack vectors and wreak havoc.
Logging is nothing but recording of the occurrence of an event or security incidence in your web application such as repeated failed login attempts from the same IP.
Monitoring, on the other hand, refers to continually keeping an eye on these logs to escalate to the incident response team for proactive and timely action.