Audit Logs
Quickly review the actions performed by members within your workspace.
Audit logs are only available on our Enterprise Plan.
You can learn more about our plans with a feature breakdown at countercyclical.io/pricing


What are Audit Logs?
Audit logs are records that capture every action taken within your a system. These logs enhance security and ensures that companies stay compliant with audits and regulatory requirements. Audit logs also play a crucial role in maintaining transparency and accountability within a company along with serving as a vital tool for security monitoring, detecting and investigating suspicious activities, resolving unauthorized access attempts, or mitigating potential security breaches.
Audit Logs in Countercyclical
Countercyclical ties every user's action within a workspace together with certain metadata such as who performed the action, what the action was, and when it was performed.
Only workspace owners and admins can see and access audit logs.
For more information on workspace visibility, please read the Permissions page in our documentation.
Audit Log Details
Each log entry comes provided with granular details, including:
The user responsible for the action
The user's workspace permission level
The specific action performed
The specific resource acted upon
IP address
Device type
Browser
Timestamp
Try hovering over the information within the log entry to review more metadata!
Search
Audit logs will be filtered based on the following default criteria:
User's first name
User's last name
User's email address
If filters are applied on top of the audit logs, the criteria above will change.

Filtering
Filters allow workspace owners and admin to more accurately filter for all audit log entries that fit certain metadata requirements.
Multiple filters can be applied at once.

Taking Action

There may be the need to quickly take action on a user within your workspace and limit their access to the workspace altogether, such as a potential security breach or unauthorized access to certain roles.
In Countercyclical, you can take action at the log-level and perform the following actions on any user within the workspace:
View log details
Filter by any of the user's log metadata fields
Change user's permission
Deactivate user
Block user
Exporting Audit Logs
Workspace owners and admins can export the audit log as a JSON or CSV file:

FAQs
Below you can find frequently asked questions related to audit logs within Countercyclical:
Do you offer integrations with Security Information and Event Management (SIEM) solutions?
While we don't currently offer any out-of-the-box integrations with SIEM's, we're more than happy to work with our Enterprise customers to build this functionality out!
Please reach out to us at [email protected] with any inquires about your current systems and we'd be more than happy to work with you!
How often should audit logs be checked, and what best practices should be followed around audit logs?
The cadence of how often audit logs should be checked will vary from team to team, department to department, and company to company. Enterprise accounts on Countercyclical can check audit logs at any time, so it's at the discretion of the company as for the frequency they take.
It's recommended that companies designate personnel responsible for regularly reviewing and analyzing Audit Logs to identify any anomalies or potential security risks proactively.
Last updated