Audit Log

In Cymmetri, the Audit Logs serve as a vital tool to maintain transparency, accountability, and security in your identity and access setup. This feature meticulously records a detailed account of various activities, ensuring a comprehensive overview of critical events and system changes.

Cymmetri uses a high performance columnar database management system designed for online analytical processing (OLAP). Its architecture and features make it well-suited for maintaining audit logs with strong protection and tamper resistance.

Below are key capabilities that contribute to these aspects:

Data Immutability

  • Append-Only Storage: The audit log storage is designed to be append-only, meaning that once data is written, it cannot be modified or deleted. This property ensures that historical audit logs remain intact and tamper-proof.

  • In-Transit and At-Rest Encryption: The system supports SSL/TLS for encrypting data in transit. For data at rest, you can use filesystem-level encryption or integrate with external encryption solutions to secure audit logs.

  • Snapshot Backups: The system supports taking backups of your data at any point in time, allowing you to restore audit logs in case of accidental loss or corruption.

For administrators looking to review system-related logs in Cymmetri, the process is simple. Just head to the "Audit Logs" tab within the Logs section. Here, you'll find a wealth of information, covering everything from user logins to requests for accessing applications.

Audit References

Cymmetri Audit Log maintains all events processed via Cymmetri. The events are tracked based on per object event log as per the Cymmetri logging framework. Events that become part of the the log are-

  1. Human driven events processed by the system. Example- a Cymmetri Admin changing an application configuration.

  2. Scheduled events processed by the system. Example- Deprovisioning job to disable Cymmetri users.

  3. Events triggering associated processes as set up in the system. Example- Authentication service will verify the authentication rule to check for Passwordless or MFA based login journey.

Cymmetri goes the extra mile by capturing each and every system event, offering administrators a thorough understanding of what's happening within the platform.

For a closer look at a specific log entry, administrators can click on the eye icon next to it. This action provides a detailed response, offering insights into the exact activities that took place.

The admin can also filter the logs based on:

  1. The actor who performed the event

  2. The performed event

  3. Start and end date of the events

  4. Target and target type

  5. Status of the event - all, success, and failed

Cymmetri provides a reference view for the changes occurred during an audit event.

In essence, Cymmetri's Audit Logs empower administrators with the tools they need to keep a close eye on system activities, ensuring a secure and well-documented identity and access management environment.

Last updated

Cymmetri.com