Audit Logging
MonitoringMedium Complexity📚 Medium
Complete record of who did what, when, and to which data
Decision Guide
✓
When to Use
- →Preparing for SOC 2, HIPAA, or any compliance audit
- →Need to investigate a data breach or suspicious access
- →Building access-review reports for management
- →Monitoring automated pipeline activity
- →Tracking data lineage at the query level
✗
When NOT to Use
- →Trying to use audit logs as a real-time alerting system
- →Debugging query performance
Controls Using This Technology
The following 2 controls use Audit Logging for implementation:
Need to Compare Options?
See how Audit Logging compares to other access control approaches with our detailed comparison table.
Compare Technologies →