Skip to content

Index

Credentials exposed in logs

Description

While logging all information may be helpful during development stages, it is important that logging levels be set appropriately before a product ships so that sensitive user data and system information are not accidentally exposed to potential attackers.

Recommendation

To avoid leaking credentials in application logs, consider the following:

  • Ensure that your logging framework or system does not include sensitive information like passwords or API keys in logs. Review your code for any sensitive data being logged.
  • Set logging levels to debug to avoid having sensitive information logged in production app.
  • Remove debug log files before deploying the application into production.
  • Adjust configurations appropriately when software is transitioned from a debug state to production.
  • Remove any test credentials or hardcoded credentials before deploying the application.

Standards

  • OWASP_MASVS_L1:
    • MSTG_STORAGE_3
  • OWASP_MASVS_L2:
    • MSTG_STORAGE_3
  • PCI_STANDARDS:
    • REQ_2_2
    • REQ_3_2
    • REQ_3_3
    • REQ_6_2
    • REQ_10_3
  • OWASP_MASVS_v2_1:
    • MASVS_STORAGE_2
  • SOC2_CONTROLS:
    • CC_2_1
    • CC_4_1
    • CC_7_1
    • CC_7_2
    • CC_7_4
    • CC_7_5