Audit & Activity Logs
Audit & Activity Logs
GovernanceAI maintains a complete, immutable audit trail of all system activities for compliance, security monitoring, and investigation.
What Gets Logged?
Every action in GovernanceAI generates an audit log entry:
User Actions
- Login/logout
- API key creation/rotation/revocation
- Policy changes
- Guardrail modifications
- Settings updates
- Data exports
- Report generation
API Calls
- Guardrail evaluations
- Policy enforcement decisions
- Scan requests
- Red-team campaigns
- Report generation
System Events
- Deployment changes
- Integration connections/disconnections
- Database operations
- Error events
- Security incidents
Data Access
- Who accessed what data
- When it was accessed
- What operation was performed
- From which IP/client
Log Entry Structure
Each audit log includes:
Querying Audit Logs
Via Dashboard
- Go to Settings → Audit Log
- Filter by:
- Date range
- Action type
- User/actor
- Resource type
- Status (success/failure)
- View details or export
Via API
Pagination
Activity Log Retention
Retention Policies
Archival & Export
Security & Integrity
Immutable Logs
Once written, logs cannot be modified:
- ❌ Cannot edit existing entries
- ❌ Cannot delete entries
- ✅ Can only query/export
- ✅ Hash chain prevents tampering
Hash Verification
Each entry includes a cryptographic hash of the previous entry:
This creates a tamper-evident chain. Any modification would break the hash chain.
Access Control
Who can view audit logs:
- Organization Admin - All logs for organization
- Workspace Admin - Logs for their workspace only
- Security/Compliance - Logs relevant to their function
- Regular Users - Their own action logs only
- Auditors - Read-only access to all logs
SIEM Integration
Export logs to your Security Information and Event Management system:
Syslog Integration
CloudWatch Integration
Splunk Integration
Alerts & Notifications
Real-Time Alerts
Get notified of critical events:
Reports & Analysis
Audit Summary Report
User Activity Report
Compliance Use Cases
SOC2 Audit Trail
GovernanceAI’s audit logs provide evidence for SOC2 CC7.2 (Monitoring):
HIPAA Audit Controls
Maps to HIPAA 45 CFR § 164.312(b) - Audit Controls:
GDPR Right to Audit
Provides evidence for GDPR Article 32 (Security):
Best Practices
✅ Do:
- Review audit logs regularly
- Set up alerts for critical events
- Export logs regularly for backup
- Archive old logs for compliance
- Monitor for suspicious patterns
- Integrate with SIEM
- Test log integrity periodically
❌ Don’t:
- Ignore audit logs
- Delete or modify logs
- Store logs without backup
- Disable audit logging
- Share logs without access control
- Forget to review sensitive actions
Next Steps
- Compliance Frameworks - Map logs to compliance
- Running Scans - Monitor scan activity
- API Reference - Audit API endpoints