Office of the Chief Information Officer

Privacy & Cybersecurity

  • Report a Cybersecurity Incident
    • Report a Cybersecurity Incident
      • Report a Compromised Device
      • Report a Phishing Email
    • Report a Stolen Device
    • Cybersecurity Vulnerability Disclosure
  • Students
    • 2-Factor Authentication
    • Be Aware of Threats
    • Cybersecurity Training
    • Develop Safe Online Habits
    • Manage and Protect My Devices
      • Report a Stolen Device
    • Manage and Protect My Identity
    • Privacy Guide to University Data
      • Passwords
        • Password Reset
  • Faculty & Staff
    • 2-Factor Authentication
    • Cybersecurity Training & Awareness
      • Be Aware of Threats
      • Develop Safe Online Habits
    • Data Classification
    • Manage and Protect My Devices
      • Report a Compromised Device
      • Report a Stolen Device
    • Manage and Protect My Identity
    • Privacy Guide to University Data
      • Privacy Solutions & Consulting
      • Passwords
        • Password Reset
  • Researchers
    • Be Aware of Threats
    • Cybersecurity Training & Awareness
    • Data Classification
    • Data Governance
    • Manage and Protect My Research
    • Privacy Solutions and Consulting
  • IT Staff
    • Help for IT Staff
    • 2-Factor Authentication
    • Be Aware of Threats
    • Cybersecurity Training & Awareness
    • Cybersecurity Vulnerability Disclosure
    • Data Classification
    • Nuts and Bolts Talks
    • Privacy Solutions and Consulting
    • Secure Code Development
    • Secure & Protect My Devices
      • Report a Compromised Device
      • Report a Stolen Device
    • Standards and Controls
  • Policies & Governance
    • Policies & Governance
      • Data Governance
      • Privacy 101
      • Ethical and Responsible Use of Generative AI
    • Illinois Security Program
      • Standards and Controls
      • Data Classification
  • Our Teams
    • Office of the CIO
    • About Us
    • Cybersecurity Team
      • CSOC
      • Infrastructure and Engineering
      • Software Development & Assurance
    • Cybersecurity Training & Awareness Team
    • Governance, Risk, & Compliance
    • Identity & Access Management Team
    • Privacy Team
    • Contact
  • Vulnerability Disclosure (link opens in new window)
  • News
  • Events
  • Resources
  • Report a Cybersecurity Incident

Logging Practices for Application Developers

Job Aid

Properly logging security events helps comply with Illinois Cybersecurity standards.

Source
KnowledgeBase: Logging Practices for Application Developers

Post navigation

Previous: API Code Review Discussion Questions
Next: Example Development Standards

Privacy & Cybersecurity

Digital Computer Lab

1304 W. Springfield Ave.

Urbana, IL 61801

Email: securitysupport@illinois.edu

  • (link opens in new window)
  • (link opens in new window)

Office of the Chief Information Officer

HELP DESK

consult@illinois.edu
submit a help request
217-244-7000

QUICK LINKS

Report an Incident

CONTACT TEAMS

Cybersecurity Engineering
securitysupport@illinois.edu

Cybersecurity Operations Center
security@illinois.edu

Governance, Risk and Compliance
digitalrisk@illinois.edu

Identity & Access Management
securitysupport@illinois.edu

Privacy
privacy@illinois.edu

  • Log In
Go to top