Audit Log
Audit log for comprehensive logging of all security-relevant actions and changes.
Audit Log – Traceability and Transparency of All Actions
The Audit Log ensures that all security-relevant processes and user actions in the system are comprehensively logged and traceable at all times.
This not only increases security but also supports compliance with regulatory requirements.
Audit Log Features
- Action Logging
- Records all security-relevant activities in the system, e.g.:
- User logins
- Configuration changes
- Certificate uploads
- Routing adjustments
- Logs are immutable and guarantee complete traceability
- Records all security-relevant activities in the system, e.g.:
- Security and Compliance Evidence
- Foundation for internal audits and external reviews (e.g., GDPR, KRITIS)
- Documents changes by users, roles, and administrators
- Detailed Information per Entry
- Each log entry contains:
- Timestamp
- User
- Affected resource
- Executed action
- Supplementary technical data (e.g., IP address, session ID) enables forensic analysis
- Each log entry contains:
- Filter and Search Options
- Filter by user, action type, or time period
- Combination of multiple criteria possible, e.g.:
- "All changes to routing rules in the last 7 days"
See Also
- Roles & Permissions – Which roles have access to the audit log.
- Settings – General system settings and configuration.