What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?
What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?
A. Limited-retention, de-identified logs including only metadata. Reasoning: To prevent phishing attacks while minimizing data retention, retaining logs that include only metadata (and are de-identified) is the most appropriate option. This approach focuses on keeping the logs concise and non-sensitive, avoiding the storage of personal data and detailed content that could be a privacy risk. It ensures that essential information is retained for security analysis and incident investigation without holding onto more data than necessary