Skip to main content

This is a new service – your feedback (opens in a new tab) will help us to improve it.

Securing application logging

Last updated: 11 August 2023
Relates to (tags): Logging, Observability, Secure development, SRE, Security, Software design

It is common to log user information from an application to assist operations or debugging. Some middleware might be configured to log full configuration, data, or request/response objects, which may contain Personally Identifiable Information (PII), authentication tokens or application secrets.

Logging any of these can make information available to people that have access to log aggregation platforms, or log storage, but are not legally allowed to view PII, or should not otherwise have access to that information. User authentication tokens and application secrets can be used to impersonate users and elevate privilege.

Sensitive Data Exposure has been a recognised risk to secure application development historically. Our managing secrets standard has requirements on ensuring logs do not contain tokens or other secrets.


Solution

Avoid explicitly logging sensitive information

  • Personal Identifiable Information (PII) of any kind
  • Session tokens or API keys
  • Application secrets

Avoid accidentally logging sensitive information as part of compound objects or arbitrary transmitted data

  • Avoid logging whole objects and prefer logging a selection of explicit fields instead
  • Avoid logging full payloads (requests, responses, file uploads, consumed or produced asynchronous messages, etc)
  • Consider where logging statements can be removed altogether

Take care when using detailed logging to support application debugging

  • Ensure detail logs are marked as DEBUG or TRACE level
  • Ensure DEBUG or TRACE log level is not enabled in production
  • Only enable detailed logging for the period of time needed to carry out debugging
  • When possible, restrict detailed logging to application components that are relevant to the issue being debugged

Log specific fields

Accidental logging often happens when logging statements serialise a whole object. At a point in time the object might be perfectly safe to log, but further introduction of new fields can introduce leaks later on. Logging specific fields can mitigate this issue.

Avoid logging full payloads

Some middleware can log full payloads e.g. HTTP requests, responses, asynchronous messages and more. Especially for inbound payloads, logging anything received means that if the data received contains anything sensitive it will be logged regardless.

Logging full payloads should be avoided. However, logging full payloads can be useful to debug specific issues. When this is the case, full payload logging should:

  • be clearly marked as DEBUG or TRACE
  • used only in non-production environments
  • limited to the application components that are under investigation (e.g. to investigate a web issue, enable HTTP payload logging but not Kafka messages logging)

Considerations

Consider whether logging statements are necessary

Sometimes logging is used for fast-feedback loops when prototyping application functionality, but eventually become redundant, or the application they provide does not provide additional operational or debugging value for an operator searching through logs.

Consider removing logging statements that do not produce value. Often logging is provided to increase confidence in an application’s correctness, or to provide data points around edge cases of validation and data processing. Most of these cases can be replaced with unit or integration testing instead, as appropriate.

For cases in which lack of confidence is caused by the data domain being broad and edge cases being unforseeable, consider using property-based testing with tooling such as QuickCheck derivatives.

Logging lifecycle

Logs won’t only be stored in one place, they will likely be generated and stored initially in the running environment and then flowed through to other log aggregation and analytics storage locations. Understand where they go and the differing retention and access considerations for each part of the lifecycle.