Every action in your identity system—user logons, permission changes, configuration modifications—can affect service availability, security posture, and compliance standing. Log audit in Alibaba Cloud IDaaS Customer Identity and Access Management (CIAM) gives you a complete, traceable record of these events, from the moment they occur through post-incident review.
What you can answer with log audit
Log audit records key operations from both user and administrator perspectives. Use it to answer questions like:
Users:
Who logged on or logged off, and when?
Which users had permission changes applied to their accounts?
Administrators:
What configuration modifications were made, and by whom?
Which operation events occurred in a given time range?
Security and compliance:
Is there a full audit trail for a specific user or operation type?
Which events should be reviewed for a security audit?
Core features
| Feature | Description |
|---|---|
| Comprehensive recording | Captures all key operations: user logon, log off, permission changes, and configuration modifications. No operation falls outside the audit trail. |
| Source tracking | Trace any event across multiple dimensions—time, user, and operation type—to locate the root cause of an issue or confirm that a change was made as expected. |
| Security audit | Meets industry security standards and compliance requirements, providing the evidence base needed to pass security audits and compliance checks. |
Use cases
Security monitoring
Real-time monitoring of your identity system for abnormal activities. When something looks wrong, the audit trail lets you detect and respond to potential security threats quickly.
Compliance checks
Produce log evidence to support enterprise compliance reviews. All critical operation events are traceable, helping you meet regulatory and standards requirements.
Troubleshooting
When a service failure or anomaly occurs, use log audit to identify the root cause and accelerate fault recovery.