Insufficient Logging CDK High

Incomplete loggging of security events, like failed logins, hampers malicious behavior detection and post-attack analysis. Adopting cloud storage may need costly logging setup, causing potential gaps in crtitical audit logs, e.g., Azure defaults to logging disabled.

Detector ID
Category
Common Weakness Enumeration (CWE) external icon