Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about the critical importance of sufficient logging and monitoring for API security in this informative conference talk. Explore real-world examples and discover five effective strategies to implement robust logging and monitoring practices for APIs. Gain insights into creating a verifiable trail of API calls for auditing, security, and observability purposes. Understand the challenges of working with sensitive data, learn about security and privacy techniques, and identify common antipatterns to avoid. Discover how proper logging and monitoring can benefit various stages of the software development lifecycle and help prevent potential security breaches.
Syllabus
Introduction
What is A10
Why does this matter
Is this problem getting worse
A10 Official Recommendations
Challenges
Best practices
Benefits across the software development lifecycle
Why is sufficient logging and monitoring important
Triggering feelings
Challenges of working with PHI
Security and privacy techniques
Software development life cycle
Antipatterns
No PII here strategy
Strategies
Taught by
OWASP Foundation