The system must allow authorized users to inspect their own session history.
Systems usually collect personal and transactional data from their users. Users should have control of their own data and, as such, should be allowed to query and inspect whatever information the system has collected from them, including their session history.
GDPR. Recital 7: The Framework is Based on Control and Certainty. Natural persons should have control of their own personal data.
HIPAA Security Rules 164.308(a)(1)(ii)(D): Information System Activity Review: Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
OWASP-ASVS v4.0.1 V7.2 Log Processing Requirements.(7.2.1) Verify that all authentication decisions are logged, without storing sensitive session identifiers or passwords. This should include requests with relevant metadata needed for security investigations.
Start with Fluid Attacks
We are a proud corporate member of the OWASP Foundation