[ISM] LLM risk mitigation (OWASP top 10):

The OWASP Top 10 for Large Language Model Applications are mitigated in the development of large language model applications.

[OWASP] Implement comprehensive logging for LLM security (SSS-02-05-09)

Security Logging and Monitoring Failures: Set up comprehensive logging and monitoring for the LLM application to detect, escalate, and respond to security incidents promptly. Log access attempts, data modifications, and unusual behaviors, and implement real-time monitoring to identify potential breaches. Regularly review logs and monitor for indicators of compromise.

[OWASP] Implement comprehensive logging and real-time monitoring (SSS-02-05-09-01)

Ensure all login attempts, access control events, and server-side validation failures are logged with sufficient user context to identify malicious accounts or behaviors. Logs should be retained for an adequate period to allow delayed forensic analysis. Format log data to be compatible with log management tools and encode it to prevent injection attacks targeting monitoring systems. High-value transactions must include tamper-proof audit trails, such as append-only databases, to prevent unauthorized changes or deletions. DevSecOps teams should deploy monitoring and alerting systems capable of identifying and escalating suspicious activities in real time. Adopt an incident response and recovery framework, such as NIST 800-61r2, to handle detected threats effectively. Utilize tools like the OWASP ModSecurity Core Rule Set and log correlation frameworks, including the ELK stack, to enable custom dashboards and alert configurations. These measures ensure swift detection and response to potential compromises.

Operations

ID Operation Description Phase Agent
SSS-02-05-09-01-01 Implement comprehensive logging for key events Log failed login attempts with user identifiers and IP addresses for forensic analysis, using structured JSON logs. Development Development teams, Security team
SSS-02-05-09-01-02 Integrate log management and monitoring tools Configure Kibana dashboards to visualize login failures, access violations, and suspicious activity in real-time. Deployment DevOps team, Security team
SSS-02-05-09-01-03 Establish alerts and incident response plans Set up alerts for multiple failed login attempts within a short period and create a playbook for responding to brute-force attacks. Deployment Security team, Incident response team
SSS-02-05-09-01-04 Ensure audit trails and log integrity Use blockchain-based logs or write-once-read-many (WORM) storage for transaction logs to prevent tampering. Post-deployment Security team, Risk management team

References

Industry framework Academic work Real-world case
Information Security Manual (ISM-1923)
The Open Worldwide Application Security Project Top 10 (A09:2021)
The Open Worldwide Application Security Project Top 10 (A09:2021)