Are audit logs available that include AT LEAST all of the following: login, logout, actions performed, and source IP address?
Explanation
Example Responses
Example Response 1
Yes, our application maintains comprehensive audit logs that exceed the minimum requirements Our logging system captures user login events (including failed attempts), logout events (both manual and timeout-based), all user actions performed within the system (with details of the specific resources accessed and modifications made), and the source IP address for all connections These logs are stored in a tamper-evident format, encrypted at rest, and retained for 12 months in accordance with our data retention policy Logs can be exported in common formats (CSV, JSON) for analysis and are integrated with our SIEM solution for real-time security monitoring Access to audit logs is restricted to authorized security personnel and requires multi-factor authentication.
Example Response 2
Yes, our platform maintains detailed audit logs covering all required elements Each log entry includes timestamp, event type (login/logout/action), user ID, source IP address, and action details For actions performed, we log the specific function accessed, parameters used, and affected resources Our logging infrastructure uses a distributed architecture with redundant storage to prevent data loss, and logs are retained for 24 months to support compliance requirements We also capture additional contextual information such as user agent details, session identifiers, and the success/failure status of each action Logs are searchable through our admin console and can be filtered by any field to facilitate incident investigation.
Example Response 3
No, our current audit logging system captures login events, actions performed, and source IP addresses, but does not consistently log logout events This limitation exists because our application uses a token-based authentication system where sessions expire rather than requiring explicit logouts We recognize this gap in our logging capabilities and are implementing an enhancement in our next release (scheduled for Q3) that will track token expiration and explicit logout events In the interim, we can approximate logout times by analyzing the last recorded action for a session combined with our token expiration settings We understand this doesn't fully meet the requirement and are prioritizing this enhancement to achieve full compliance.
Context
- Tab
- Product
- Category
- Authentication, Authorization, and Account Management

