Skip to main content
Home / Technologies / Audit Logging

Audit Logging

MonitoringMedium Complexity📚 Medium

Complete record of who did what, when, and to which data

Decision Guide

When to Use

  • Preparing for SOC 2, HIPAA, or any compliance audit
  • Need to investigate a data breach or suspicious access
  • Building access-review reports for management
  • Monitoring automated pipeline activity
  • Tracking data lineage at the query level

When NOT to Use

  • Trying to use audit logs as a real-time alerting system
  • Debugging query performance

Need to Compare Options?

See how Audit Logging compares to other access control approaches with our detailed comparison table.

Compare Technologies →