Risk: Breaches go undetected due to poor monitoring. Shows insufficient logging, monitoring, and incident response capabilities.
Decide what to log, structure events, and build alerts that catch meaningful signals while reducing noise.
Add logging to a demo app, forward to a collector, and tune alerts.
Retention, privacy, and secure transport/storage of logs in production.