How can you design your logging system to verify authenticity of your logs?

One of your primary business objectives is being able to trust the data stored in your application. You want to log all changes to the application data.

How can you design your logging system to verify authenticity of your logs?
A . Write the log concurrently in the cloud and on premises
B . Use a SQL database and limit who can modify the log table
C . Digitally sign each timestamp and log entry and store the signature
D . Create a JSON dump of each log entry and store it in Google Cloud Storage

Answer: C

Explanation:

Write a log entry. If the log does not exist, it is created. You can specify a severity for the log entry, and you can write a structured log entry by specifying –payload-type=json and writing your message as a JSON string:

gcloud logging write LOG STRING

gcloud logging write LOG JSON-STRING –payload-type=json

References: https://cloud.google.com/logging/docs/reference/tools/gcloud-logging

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments