© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
M. BakerSecure Web Application Development https://doi.org/10.1007/978-1-4842-8596-1_12

12. Logging and Monitoring

Matthew Baker1  
(1)
Kaisten, Aargau, Switzerland
 

This is arguably the most important chapter in the book. Try as we may to prevent attackers compromising our systems, there will always be a chance that one will succeed. Damage, actual and reputational, can be minimized by taking action early. Damage can even be prevented by acting as soon as unauthorized access is attempted, before an attacker succeeds in gaining entry.

In order to respond rapidly to unauthorized access, you must generate logs, and you or an operations team must monitor them. This ...

Get Secure Web Application Development: A Hands-On Guide with Python and Django now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.