From the course: Threat Modeling: Repudiation in Depth

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Log analysis

Log analysis

From the course: Threat Modeling: Repudiation in Depth

Start my 1-month free trial

Log analysis

- [Instructor] Logs are rarely stored in the customer service desk and the form of logs is rarely what the customer service agent needs, nor are they stored in a form that's helpful to developers, incident responders, or the myriad other people who might need to use them. The process of constructing and delivering useful information from logs is less like security and more like typical product management. You need to understand the normal use cases and make sure the logs stick around long enough to be used in those circumstances. You should run your data systems in UTC, especially including logging. The value of a timestamp is its consistency with other timestamps. Your log analysis software may resolve that into something that's presented with human time zones, but remember, twice a year, politicians mess with clocks and if you operate globally, time zones jump on different days. This can mess up scheduled tasks. Do…

Contents