Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Secure Your Logs: Best Practices to Protect Sensitive Data

DevConf via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
This 13-minute talk from DevConf.IN 2025 explores the critical importance of securing log data to prevent security breaches. Learn how logs often contain sensitive information like personal details, financial data, and authentication credentials that can lead to serious security vulnerabilities when improperly handled. Discover effective methods for implementing secure logging practices, including techniques for masking or redacting sensitive information, configuring appropriate logging levels across different environments, and properly securing log storage with encryption and access controls. Examine real-world data breach examples that could have been prevented through better log management. The presentation by Aakanksha Bhende provides practical strategies for balancing effective logging for debugging and monitoring while maintaining robust security to meet regulatory requirements and protect against unauthorized access.

Syllabus

Secure Your Logs: Best Practices to Protect Sensitive Data - DevConf.IN 2025

Taught by

DevConf

Reviews

Start your review of Secure Your Logs: Best Practices to Protect Sensitive Data

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.