Skip to content

The application must not write sensitive data into the application logs.

An XCCDF Rule

Description

It is important to identify and exclude certain types of data that is written into the logs. If the logs are compromised and sensitive data is included in the logs, this could assist an attacker in furthering their attack or it could completely compromise the system. Examples of such data include but are not limited to; Passwords, Session IDs, Application source code, encryption keys, and sensitive data such as personal health information (PHI), Personally Identifiable Information (PII), or government identifiers (e.g., SSN).

ID
SV-222444r960879_rule
Version
APSC-DV-000650
Severity
Medium
References
Updated

Remediation Templates

A Manual Procedure

Design or reconfigure the application to not write sensitive data to the logs.