Skip to content

Audit Log

Path: /audit

Audit Log

Tamper-evident activity log with hash chain verification. Every significant action in the system is recorded here.

Key Elements

  • Filters — Filter by entity type (User, Report, Incident, Vendor, Policy) and action (Created, Updated, Deleted).
  • Entry table — Timestamp, action, entity type, entity name/ID, and SHA-256 checksum.
  • Verify Chain Integrity button — Cryptographically verify the entire audit log chain hasn't been tampered with.

How to Use the Audit Log

  1. Use filters to find specific activities (e.g., all "Created" actions on "Incident" entities).
  2. Click Details on any entry to see the full record including who performed the action.
  3. Click Verify Chain Integrity to run a cryptographic verification — this confirms no log entries have been modified or deleted.

Compliance

The hash chain ensures compliance with SOC 2 CC7.2 (system monitoring) and ISO 27001 A.12.4 (logging and monitoring).