Cyber Posture

CWE · MITRE source

CWE-778Insufficient Logging

Abstraction: Base · CVEs in our corpus: 23

When a security-critical event occurs, the product either does not record the event or omits important details about the event when logging it.

When security-critical events are not logged properly, such as a failed login attempt, this can make malicious behavior more difficult to detect and may hinder forensic analysis after an attack succeeds. As organizations adopt cloud storage resources, these technologies often require configuration changes to enable detailed logging information, since detailed logging can incur additional costs. This could lead to telemetry gaps in critical audit logs. For example, in Azure, the default value for logging is disabled.

Last updated: 09 May 2026 03:25 UTC

NIST 800-53 r5 controls that address this weakness (24)AI

Showing the 13 most specific. Generic controls that address many weakness types are collapsed below.

Control Title Family Why it addresses this CWE
AU-1Policy and ProceduresAUAudit policy requires defining and implementing logging of security-relevant events, directly reducing insufficient logging.
AU-10Non-repudiationAUProviding proof of performed actions necessitates sufficient logging of security-relevant events with attribution details.
AU-11Audit Record RetentionAURetaining audit records for a defined period ensures security-relevant events remain available for after-the-fact investigations, directly mitigating the risk that attackers can hide actions due to missing or purged log data.
IR-1Policy and ProceduresIRIncident response policy mandates logging and monitoring requirements to detect and record security events.
IR-3Incident Response TestingIRIR testing would reveal insufficient logging that impairs incident analysis and response effectiveness.
IR-4Incident HandlingIRDetection and analysis phases require sufficient logging to identify and investigate incidents, addressing insufficient logging.
PM-14Testing, Training, and MonitoringPMMonitoring plans mandate sufficient logging and event collection to detect anomalous behavior and support incident response.
PM-21Accounting of DisclosuresPMMandating retention and availability of disclosure accounting ensures security-relevant events involving PII release are logged rather than omitted.
PM-31Continuous Monitoring StrategyPMDrives organization-wide metrics, frequencies, and correlation of monitoring data, directly mitigating insufficient logging and observability.
PE-3Physical Access ControlPERequires maintenance of physical access audit logs, directly mitigating insufficient logging of access attempts and events.
PE-8Visitor Access RecordsPEThe requirement to maintain visitor access records implements logging of security-relevant physical access events, preventing insufficient logging of such events.
CA-7Continuous MonitoringCAContinuous monitoring requires establishing metrics, ongoing data collection, correlation, and analysis, directly mitigating insufficient logging by ensuring security-relevant events are captured and reviewed.
MA-4Nonlocal MaintenanceMAMaintaining records of nonlocal maintenance activities ensures logging to support detection of issues.
Show 11 more broadly-applicable controls
AU-12Audit Record GenerationAUDirectly requires generation of audit records for specified events, preventing the absence of logging that allows undetected malicious activity.
AU-14Session AuditAUDirectly implements detailed session logging to address the weakness of insufficient logging.
AU-15Alternate Audit Logging CapabilityAUProvides alternate logging mechanism to maintain audit trails when primary capability fails, directly reducing insufficient logging.
AU-16Cross-organizational Audit LoggingAUEmploying coordination mechanisms ensures consistent and sufficient logging practices are applied when audit information crosses organizational boundaries.
AU-2Event LoggingAUThis control requires identifying, specifying, and justifying event types for logging with a focus on adequacy for post-incident investigations, directly mitigating insufficient logging.
AU-3Content of Audit RecordsAUThis control directly specifies the minimum content required in audit records to establish event details, attribution, and outcomes, thereby mitigating insufficient logging.
AU-4Audit Log Storage CapacityAUAllocating dedicated audit log storage capacity ensures security-relevant events can be recorded and retained without premature loss or overwrite due to exhaustion, directly supporting sufficient logging.
AU-7Audit Record Reduction and Report GenerationAUThe reduction and report generation capability directly enables usable on-demand review and incident investigation, mitigating insufficient logging by ensuring audit data can be effectively analyzed without loss of original records.
AU-8Time StampsAURequiring internal clock-based timestamps directly improves audit record completeness, reducing the impact of insufficient logging for incident analysis.
IR-5Incident MonitoringIRImplementing incident tracking and documentation requires logging of security-relevant events, directly mitigating insufficient logging that allows undetected exploitation.
PM-6Measures of PerformancePMDeveloping and monitoring security performance measures requires systematic collection and analysis of control effectiveness data, directly reducing insufficient logging.

Top CVEs of this weakness type, ranked by Risk Priority

CVE Risk CVSS EPSS Published
CVE-2024-489672.010.00.00282024-11-14
CVE-2026-326931.88.80.00072026-03-18
CVE-2019-76131.57.50.00182019-03-25
CVE-2021-434191.57.50.00252023-11-07
CVE-2019-192771.36.50.00292020-03-10
CVE-2025-526441.25.80.00042026-03-16
CVE-2023-19951.15.30.00172023-08-29
CVE-2025-25621.15.40.00292025-03-26
CVE-2025-329671.15.40.00802025-05-23
CVE-2025-534981.15.30.00262025-07-07
CVE-2026-255981.15.30.00022026-02-09
CVE-2019-192950.94.30.00282020-03-10
CVE-2021-336890.94.30.00232021-07-14
CVE-2022-257830.94.30.00232022-05-04
CVE-2024-22910.94.30.00092024-03-20
CVE-2025-665520.94.30.00032025-12-05
CVE-2026-222790.94.30.00042026-01-22
CVE-2026-34940.94.30.00012026-03-03
CVE-2022-303050.83.70.00222022-12-06
CVE-2021-326800.73.30.00202021-07-12
CVE-2024-249010.63.00.00032024-03-04
CVE-2022-311200.42.10.00392022-08-04
CVE-2024-108630.00.00.00152024-11-22