Skip to content

Commit a5658fc

Browse files
Update docs/Secure-Coding-Guide-for-Python/CWE-693/CWE-778/README.md
Co-authored-by: myteron <[email protected]> Signed-off-by: andrew-costello <[email protected]>
1 parent 1d6ae62 commit a5658fc

File tree

1 file changed

+1
-1
lines changed
  • docs/Secure-Coding-Guide-for-Python/CWE-693/CWE-778

1 file changed

+1
-1
lines changed

docs/Secure-Coding-Guide-for-Python/CWE-693/CWE-778/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
Ensure you have sufficient logging in order to adequately record important events within an application and/or system.
44

5-
This can leave applications vulnerable to undetected attacks, as malicious users are able to perform harmful activities without leaving a trace in the logs. Without comprehensive and sufficient logging, it becomes challenging to identify and respond to security incidents, leading to delayed and/or inefficient incident response efforts.
5+
Without comprehensive and sufficient logging, it becomes challenging to identify and respond to security incidents, leading to delayed and/or inefficient incident response efforts.
66

77
Insufficient logging also negatively affects forensic analysis, hindering the ability to reconstruct events accurately after a breach.
88

0 commit comments

Comments
 (0)