A software developer has been deploying web applications with common security risks to include insufficient logging capabilities. Which of the following actions would be most effective to reduce risks associated with the application development?
A.
Perform static analyses using an integrated development environment
B.
Deploy compensating controls into the environment
C.
Implement server-side logging and automatic updates
D.
Conduct regular code reviews using OWASP best practices
A tricky one, but here is my take.
OWASP (Open Web Application Security Project) provides a comprehensive set of guidelines, best practices, and tools for identifying and mitigating web application security risks. Regular code reviews using OWASP guidelines enable developers to systematically identify security vulnerabilities, including insufficient logging capabilities, within the codebase.
C. Implement server-side logging and automatic updates.
Insufficient logging is a significant security risk because it can make it difficult to detect and respond to security incidents. By implementing server-side logging, the application can record important events and actions, which can aid in monitoring and investigating potential security breaches.
You guys have to stop using ChatGPT. There's a difference between server level logging and application level logging. You can enable server logging while having your application with insufficient logging, like with logins and URI hits. In terms of implementing security improvements into the SDLC (which is what this question is asking), code reviews need to incorporate OWASP best practices. OWASP includes implementing proper logging in your application in its recommendations.
C (Implement server-side logging and automatic updates) directly addresses the problem of "insufficient logging capabilities." It ensures that critical events are being logged on the server side, which is crucial for detecting, responding to, and investigating security incidents. Additionally, automatic updates ensure that security patches are applied in a timely manner, reducing the risk of known vulnerabilities being exploited.
D (Conduct regular code reviews using OWASP best practices) is also important, but it doesn't specifically focus on the logging issue mentioned in the question. Regular code reviews can help catch security issues, but logging is more of an operational security control than a code issue, so C is a more targeted and effective solution for the specific risk described.
Implementing server side logging DIRECTLY addresses the issue pointed out. While OWASP reviews could solve even more problems, they are only that, a REVIEW. This isn't a mitigation but a detection/identification of issues, we already know it has logging issues, we don't need a review to tell us again. Of course the review should have some coding changes done afterwards but that's not guaranteed by the phrasing of the answer.
The most effective action to reduce risks associated with insufficient logging capabilities would be:
C. Implement server-side logging and automatic updates
This action directly addresses the issue of insufficient logging by ensuring that comprehensive server-side logging is in place. Additionally, automatic updates can help keep the application secure by ensuring it receives the latest security patches and improvements.
upvoted 1 times
...
This section is not available anymore. Please use the main Exam Page.CS0-003 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Brick69
Highly Voted 1 year, 2 months agonarst
Highly Voted 1 year, 2 months ago3be4f49
1 year, 1 month agofuzzyguzzy
Most Recent 5 months agocy_analyst
7 months agokinny4000
7 months agovoiddraco
8 months, 1 week agoOmo_Mushin
9 months, 2 weeks ago