🔒 Audit Logs

Overview

CyberAi maintains comprehensive audit logs to track system activities, security events, and user actions. This page describes our audit logging capabilities and how to access them.

What We Log

📝 Code Changes

  • All commits tracked via Git version control
  • Pull request reviews and approvals
  • Branch creation and deletion events
  • Tag and release activities

🔐 Security Events

  • Authentication attempts (success and failure)
  • Authorization decisions and access denials
  • Security scan results (CodeQL, GitAntivirus)
  • Vulnerability detections and resolutions

⚙️ System Operations

  • GitHub Actions workflow executions
  • Deployment events and status
  • Configuration changes
  • API requests and responses

👤 User Activities

  • Login and logout events (when authentication enabled)
  • Profile updates and password changes
  • Subscription and payment transactions
  • Permission and role modifications

Accessing Audit Logs

GitHub Actions Logs

View workflow execution logs in the GitHub Actions tab. Logs include build outputs, test results, and deployment activities.

Git History

All code changes are permanently tracked in Git history:

git log --all --oneline --graph
git log --author="username" --since="2026-01-01"

Security Advisories

Security-related events are tracked in GitHub Security tab, including vulnerability reports and resolutions.

Log Retention

CyberAi maintains audit logs with the following retention policies:

  • Git History: Permanent (stored in repository)
  • GitHub Actions Logs: 90 days (GitHub default)
  • Security Events: Permanent (via GitHub Security)
  • User Activity Logs: Configurable (when implemented)

Log Format

Audit logs follow structured formats for easy parsing and analysis:

  • Timestamp: ISO 8601 format (UTC)
  • Event Type: Category and action
  • Actor: User or system performing action
  • Resource: Entity being acted upon
  • Result: Success or failure status
  • Metadata: Additional contextual information

Compliance & Security

Audit logs support compliance requirements:

  • Non-repudiation of actions
  • Forensic analysis capabilities
  • Incident response support
  • Regulatory compliance (SOC 2, GDPR, etc.)

See our Compliance Documentation for framework details.

Related Documentation

← Back to Documentation