1000-ft view: reliable detection needs structured logs, redaction,
timestamps in UTC, alerting on thresholds, and tamper evidence.
Each section shows the secure design and writes to the demo logs under /a09_logging/logs.
Secure idea: log who, what, where (IP), when (UTC),
and outcome as structured JSON with a corr_id to tie related events.
corr_id to see correlation.
Secure idea: never log raw passwords, tokens, or full PII. Redact
to hints (e.g., last 4 of SSN), hash tokens, and assign an event_id for correlation.
Secure idea: every line is valid JSON with an ISO-8601 UTC timestamp and
stable keys (ts, evt, user, ip, meta).
app.jsonl.
Secure idea: track failures per source in a time window and emit to an
alerts.log when a threshold is crossed (e.g., 10 failed logins in 5 minutes).
Secure idea: each JSONL entry is accompanied by a signature in
app.sigchain that chains from the previous line. Verification reveals the first tampered line.