-
Dive into the ninth and tenth categories of security vulnerabilities in the OWASP Top 10: using components with known vulnerabilities and insufficient logging and monitoring.
Overview
Syllabus
-
Introduction
- Prevent common software vulnerabilities
- General concept
- Example scenario 1
- Example scenario 2
- Continuously inventory and monitor
- Apply virtual patches
- General concept
- Example scenario 1
- Example scenario 2
- Ensure logs have sufficient user context
- Ensure timely detection and response
- Establish an incident response plan
- Next steps