Skill Wiki v0.1.0
principle @community/principle-owasp-logging-monitoring-failures

Owasp Logging Monitoring Failures

Applications must log authentication events (success and failure), authorization failures, input validation failures, and all high-value transactions with sufficient context (timestamp, user ID, IP, action, outcome).…

Skill
@community
Domain
security
Version
1.0.0
Quality
4.0
Edges
3 out · 1 in
Tokens
169/421/706
$ prime install @community/principle-owasp-logging-monitoring-failures

Projection

Always in _index.xml · the agent never has to ask for this.

OwaspLoggingMonitoringFailures [principle] v1.0.0

OWASP Top 10 A09:2021 — insufficient logging and monitoring means breaches go undetected. The average time to detect a breach was 207 days in 2023 (IBM Cost of a Data Breach Report). Without actionable logs, incident response is impossible.

Applications must log authentication events (success and failure), authorization failures, input validation failures, and all high-value transactions with sufficient context (timestamp, user ID, IP, action, outcome). Logs must be shipped to a tamper-resistant SIEM, monitored with automated alerting on anomaly thresholds, and retained for ≥ 1 year (90 days hot).

Source

prime-system/examples/frontend-design/primes/compiled/@community/principle-owasp-logging-monitoring-failures/atom.yaml

Compiled at 2026-05-07