Audit Logs

Audit logs are essential for tracking system activities and ensuring accountability within the IAM solution. They provide a detailed record of user and system activities, helping administrators monitor actions, detect anomalies, and ensure compliance with security policies and regulations.

Compliance and Security Benefits:

  • Regulatory Compliance: Audit logs provide an evidence trail for audits and help meet regulatory requirements such as HIPAA, GDPR, and SOC 2 by showing compliance with security controls.
  • Forensic Investigations: In the event of a security breach or data leak, audit logs can help identify the root cause, understand the scope of the incident, and determine which users or systems were affected.
  • Proactive Security Monitoring: Continuous monitoring of audit logs enables administrators to detect suspicious behavior, such as multiple failed login attempts or unauthorized access, allowing for prompt remediation.
  1. Accessing the Audit Module:

Navigation:

  • Go to the IAM system dashboard.
  • Select Audit Module from the side menu.
  1. Audit Logs Overview:

The Audit Module presents different categories of activities in the system. Each category provides detailed logs of related events.

Categories of Audit Logs:

User Activities:

Track all user lifecycle events within the system.

Data Captured: User email, user role, creation date, user groups, user status, and details of activities such as user creation, group assignment, password changes, role assignments, and more.

Login Activities:

Monitor login attempts through email and password (SSO).

Data Captured: User email, date & time, app accessed, status (successful/failed), and reasons for failed attempts (e.g., wrong password).

MFA and Biometric Activities:

Track all activities involving Multi-Factor Authentication (MFA) and biometrics.

Data Captured: User email, date & time, MFA method used (OTP, fingerprint, portrait), app accessed, status (successful/failed), reasons for failure, and number of failed attempts.

Session Details:

Review session details for each user session.

Data Captured: User email, session start and end times, session duration, apps accessed, and session type (concurrent or single).

Integration Activities:

Log details of all application integrations with the IAM system.

Data Captured: Application name, integration time and date, integration type (e.g., SSO), protocol used, and status (e.g., active, inactive).

  1. Filtering and Searching Logs :

To streamline the audit process, the Audit Module provides filtering and search functionality:

Filters:

  • By Date Range: Select a specific date range to filter events.
  • By User: Search by user email to view specific user actions.
  • By Status: Filter activities based on their status (e.g., successful, failed).

Search Functionality:

Use the search bar to enter keywords or user-specific details to locate specific audit entries across all log categories.

  1. Detailed Activity View:

For a more in-depth review of specific audit entries:

User Activity Details:

Clicking on a user’s log entry will display a detailed view that includes:

  • A list of all activities performed by/on the user.

  • The creation date, assigned groups, current roles, and privileges.

  • A table showing activity date, action performed (e.g., group assignment, role change), and who performed the action.

Login and MFA Details:

For login or MFA failures, additional information is provided, including the reason for failure (e.g., wrong password, deactivated account) and the number of failed attempts.

  1. Exporting Logs :

Audit logs can be exported for reporting and compliance purposes:

Export Options:

  • CSV: Export logs for use in spreadsheets or further analysis.
  • PDF: Generate a PDF report for sharing or documentation.
  • Export Categories:

You can export the entire log or filter the data first and export only the filtered results (e.g., failed login attempts in the last 30 days).