Web application security - the fast guide 1.1 | Page 21
Chapter 1 - information Security overview
P a g e | 21
Figure 13: Custom error page
b. Keeping Audit logs: The worst attacks those that do not leave a
trace because it does not give any answer to investigators on what
assets has been compromised, information disclosed, accessed or
altered and nothing about used vulnerability or the identity of
attacker.
Audit logs should have precise information about all events,
transactions and access attempts that took place and its status
(failed, succeeded) with special focus on any abnormal request
showing malicious pattern.
When storing and managing audit logs it is very critical to be sure
that information cannot be accessed nor changed by attacker even
if that means to isolate as separated system or store the
information on write-once media.
Figure 14:Access Logs
c. You are under attack: another important issue in handling
attacker is to let the administrator know that the system is under