Over a million developers have joined DZone.

Failure to Lognch

DZone 's Guide to

Failure to Lognch

The requirements of engineers often roll downhill to the developers, where there's a lot of discretion.

· Performance Zone ·
Free Resource

I had to fight tooth and nail to get this blog title. I hope it made you shoot air out of your nose with a little more thrust than usual.

Let’s spare a moment in solidarity with the VPs of Engineering out there. They have a crucial role to play in software security. Unfortunately, they are often asked by security to deliver a policy requirement X, such that:

  • X is not well-specified
  • X is not practically testable
  • X is not part of stakeholder functionality
  • X is not used by engineering
  • X is not reflected in KPIs for engineering
  • X does not come with budget

This is exactly the issue with security and audit logging. The requirement simply rolls downhill to the developers, where there’s lots of discretion applied. Thousands of policies don’t have the same effect as one line of code.

Obviously, there are huge gaps here. Many security-relevant events and actual attacks will be missed for the following reasons: 

  • The developers don’t know about that type of attack
  • The attackers evaded the developers’ simple approach to attack detection
  • The developers didn’t think an event was important
  • The developers couldn’t possibly log it (i.e., it happens in library or runtime)

There are also more cynical reasons, like failure to care, or failure to prioritize. Developers aren’t incentivized on this in any way, so we’re really just hoping on goodwill.

Let’s talk solutions.

Automatic Log Enhancers

Instead of trying to teach developers about how to detect attacks and get logs regarding their security, Contrast Protect’s RASP technology just does it for you. Isn’t that better than arguing about it with security?

Contrast ships out of the box looking to instrument many core APIs with logging. Don’t you want to be alerted when a new .DLL or .so is loaded into your JVM process? How about when your end users authenticate with Spring library?

Here’s an example from the product. This Log Enhancer will automatically weave a message into your logs if the developer chooses to override how SSL hostnames are verified! Pretty cool!


As shown, you can control what the log message looks like and include the parameters, instance, return value, etc.

You can also add your own log enhancers to our product. You know what your APIs are, and chances are, some of them don’t do enough logging. You can use this feature to enhance the logs without requiring a code deploy.

performance ,engineers ,developers ,log enhancers

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}