Whether responding to incidents, validating compliance, or tracking down the root cause of an operational issue, the audit logging service plays a central role in maintaining trust, transparency, accountability, and security.
Comprehensive and High-Fidelity Logging
Logged attributes include:
- user identifiers
- source IP addresses
- endpoint names
- tenancy IDs
- event types (e.g., read, write, modify, delete)
- operation status codes
- supplementary event details
- precise timestamps.
This high level of detail provides the foundation for forensic investigation, operational troubleshooting, behavioral analytics, and compliance verification. Every action that modifies or interacts with a critical service component is logged, timestamped, and preserved in a secure and immutable format.
Figure 1: Audit logs event details
Enforced Logging and Fail-Safe Mechanisms
Access Channels and Integration Flexibility
Rest API
This programmatic access allows teams to automate tasks such as alerting, reporting, and log ingestion into dashboards or SIEM solutions. It reduces manual overhead and frees security and operations teams to focus on investigation and response activities rather than routine data collection.
Inquire about the Rest API documentation for more information.
Advanced Search and Event Filtering Capabilities
These advanced filtering capabilities make the service a highly effective tool for conducting investigations, supporting compliance audits, or analyzing patterns that may indicate policy violations, insider threats, or unauthorized changes.
Figure 2: Audit logs Search function
Usefulness in Incident Response and Forensics
Audit logging transforms these scenarios into verifiable, evidence-driven analyses.