All Talks

A Crash Course in Audit Logs

Application audit logs include a breadcrumb trail of all user activity and the logs are used to answer many different questions in a variety of contexts. Development teams perform analytics on the logs. Security teams write threat detection logic on the logs. Customers will arbitrarily request the logs. Government regulations (GDPR, CCPA, etc.) will mandate that you save them, but then eventually delete them. Your responsibility as a developer or security engineer is to make sure the logs are …

You might be interested in:

May 2019 DevOps
Intro: SPIFFE Intro: SPIFFE

Intro: SPIFFE

Emiliano Bernbaum & Scott Emmons, Scytale

November 2019 DevOps
Sponsored Keynote: Network, Please Evolve – Chapter 2 Sponsored Keynote: Network, Please Evolve – Chapter 2

Sponsored Keynote: Network, Please Evolve – Chapter 2

Vijoy Pandey, Vice President/CTO Cloud