Audit Log¶
Path: /audit

Tamper-evident activity log with hash chain verification. Every significant action in the system is recorded here.
Key Elements¶
- Filters — Filter by entity type (User, Report, Incident, Vendor, Policy) and action (Created, Updated, Deleted).
- Entry table — Timestamp, action, entity type, entity name/ID, and SHA-256 checksum.
- Verify Chain Integrity button — Cryptographically verify the entire audit log chain hasn't been tampered with.
How to Use the Audit Log¶
- Use filters to find specific activities (e.g., all "Created" actions on "Incident" entities).
- Click Details on any entry to see the full record including who performed the action.
- Click Verify Chain Integrity to run a cryptographic verification — this confirms no log entries have been modified or deleted.
Compliance
The hash chain ensures compliance with SOC 2 CC7.2 (system monitoring) and ISO 27001 A.12.4 (logging and monitoring).