Skip to main content

Avoid logging sensitive data


The system must not register sensitive information when logging exceptional events.


While event logging is generally a good security practice, the organization must consider that using high logging levels is only appropriate for development environments, since having too much log information in production stages may hinder the performance of a system administrator in detecting abnormal conditions. Furthermore, if sensitive information is recorded in the logs, an attacker that gets access to these can also obtain the information.


  1. If an attacker gets access to the logs, he might be able to compromise other systems using the sensitive information.


  • Layer: Application layer

  • Asset: Logs

  • Scope: Confidentiality

  • Phase: Operation

  • Type of control: Procedure