Aakanksha Bhende
Hey there, I'm Aakanksha, a 2023 CSE grad, I'm currently working at Red Hat as an Associate Software Engineer. I'm an Open Source Enthusiast who has guided 100+ participants to start their open-source journey. I have contributed to numerous open-source projects like AsyncAPI organization, Meshery (a CNCF project), etc and now mentoring various projects and teams. I have received the prestigious Linux Foundation Training Scholarship (LiFT’23 - Recipient under the Women in Open-Source category
amongst the top 500 scholars globally). I'm a GitHub Campus Expert where I was selected among the top 65 Campus Experts from around 10,000 global applications and uplifted my local community on campus with training, mentorship, and support from GitHub. I also led a team that aimed at increasing API literacy among the participants as Team Lead at Postman API Fest’22.
Red Hat
Job title –Associate Software Engineer
Session
Data breaches have become a major concern in today’s interconnected world, highlighting the urgent need to protect sensitive information. Logs, often overlooked, are treasure troves of critical data that can pose significant security risks if exposed. They frequently contain personal information, financial details, authentication credentials, and other sensitive data. When mishandled or left unprotected, these logs can become entry points for data breaches, unauthorized access, and identity theft. Moreover, failure to safeguard logs can lead to violations of legal and regulatory requirements, potentially resulting in hefty fines and reputational damage.
While logging is indispensable for debugging and monitoring applications, it must be approached cautiously to avoid exposing sensitive data. Careless logging practices, such as recording passwords, personal user details, or financial information, can lead to severe security vulnerabilities. To mitigate these risks, developers must adopt secure logging practices. This includes avoiding the logging of sensitive information altogether or using techniques like masking or redaction when necessary. Logging levels should be configured thoughtfully, ensuring detailed logs are used only in development or debugging stages while minimizing exposure in production environments. Logs should also be securely stored, encrypted, and access-controlled to prevent unauthorized access.
In this talk, we will explore and learn about effective methods and strategies for securing information while maintaining the efficiency and reliability of log management systems. By implementing these best practices, organizations can strengthen their security defences and protect sensitive data from potential threats. We will also see some real-life data breaches in history, and how they could have been prevented.