Audit Logs

Quickly review the actions performed by members within your workspace.

Audit logs are only available on our Enterprise Plan.

You can learn more about our plans with a feature breakdown at countercyclical.io/pricing

What are Audit Logs?

Audit logs are records that capture every action taken within your a system. These logs enhance security and ensures that companies stay compliant with audits and regulatory requirements. Audit logs also play a crucial role in maintaining transparency and accountability within a company along with serving as a vital tool for security monitoring, detecting and investigating suspicious activities, resolving unauthorized access attempts, or mitigating potential security breaches.

Audit Logs in Countercyclical

Countercyclical ties every user's action within a workspace together with certain metadata such as who performed the action, what the action was, and when it was performed.

Only workspace owners and admins can see and access audit logs.

For more information on workspace visibility, please read the Permissions page in our documentation.

Audit Log Details

Each log entry comes provided with granular details, including:

  • The user responsible for the action

  • The user's workspace permission level

  • The specific action performed

  • The specific resource acted upon

  • IP address

  • Device type

  • Browser

  • Timestamp

Try hovering over the information within the log entry to review more metadata!

Audit logs will be filtered based on the following default criteria:

  • User's first name

  • User's last name

  • User's email address

If filters are applied on top of the audit logs, the criteria above will change.

Filtering

Filters allow workspace owners and admin to more accurately filter for all audit log entries that fit certain metadata requirements.

Multiple filters can be applied at once.

Taking Action

There may be the need to quickly take action on a user within your workspace and limit their access to the workspace altogether, such as a potential security breach or unauthorized access to certain roles.

In Countercyclical, you can take action at the log-level and perform the following actions on any user within the workspace:

  • View log details

  • Filter by any of the user's log metadata fields

  • Change user's permission

  • Deactivate user

  • Block user

Exporting Audit Logs

Workspace owners and admins can export the audit log as a JSON or CSV file:

FAQs

Below you can find frequently asked questions related to audit logs within Countercyclical:

Do you offer integrations with Security Information and Event Management (SIEM) solutions?

While we don't currently offer any out-of-the-box integrations with SIEM's, we're more than happy to work with our Enterprise customers to build this functionality out!

Please reach out to us at enterprise@countercyclical.io with any inquires about your current systems and we'd be more than happy to work with you!

How often should audit logs be checked, and what best practices should be followed around audit logs?

The cadence of how often audit logs should be checked will vary from team to team, department to department, and company to company. Enterprise accounts on Countercyclical can check audit logs at any time, so it's at the discretion of the company as for the frequency they take.

It's recommended that companies designate personnel responsible for regularly reviewing and analyzing Audit Logs to identify any anomalies or potential security risks proactively.

Last updated