Audit Trail & Activity Logs

The Audit Trail provides comprehensive visibility into all activities within your Devdraft account. Track who did what, when, and where to maintain security, ensure compliance, and troubleshoot issues effectively.

Purpose of Audit Trail

Audit trails serve multiple critical purposes:
  • Security Monitoring: Detect unauthorized access and suspicious activity
  • Compliance: Meet regulatory requirements for activity logging
  • Troubleshooting: Identify the source of issues and changes
  • Accountability: Ensure users are responsible for their actions
  • Forensics: Investigate security incidents and data breaches
Audit trails are essential for organizations handling financial data and customer information.

What’s Tracked

Devdraft automatically logs a comprehensive range of activities:

User Activities

User Activity Events

  • Authentication: Login/logout events, failed attempts, password changes
  • Session Management: Session creation, timeout, and termination
  • Profile Changes: Email updates, password resets, 2FA configuration
  • Access Patterns: IP addresses, device information, geographic location

System Operations

System Operation Events

  • Configuration Changes: Settings modifications, feature toggles
  • API Usage: API calls, rate limiting events, authentication failures
  • Data Operations: Data exports, imports, bulk operations
  • System Maintenance: Updates, maintenance windows, performance events

Financial Activities

Financial Activity Events

  • Transaction Management: Payment processing, refunds, disputes
  • Account Changes: Payout settings, bank account updates
  • Fee Adjustments: Fee modifications, discount applications
  • Settlement Events: Payout processing, reconciliation

Administrative Actions

Administrative Events

  • User Management: Invitations, role changes, account suspensions
  • Permission Updates: Role modifications, access grants/revocations
  • Security Settings: IP restrictions, authentication requirements
  • Organization Changes: Billing updates, plan modifications

Accessing Audit Logs

1

Navigate to Audit Trail

Go to Users & PermissionsAudit Trail in the Devdraft Console.
You’ll see a comprehensive log of all activities with timestamps and user information.
2

Review Recent Activity

The dashboard shows recent events with key information:
  • Timestamp and date
  • User who performed the action
  • Action type and description
  • Resource affected
  • IP address and location
3

Explore Event Details

Click on any event to view detailed information:
  • Complete event data
  • Before/after values for changes
  • Related events and context
  • Technical details and metadata
Audit trail interface with event list and detailed information

Audit trail dashboard showing comprehensive activity logs with filtering options

Efficiently find the information you need with powerful filtering capabilities:

Basic Filters

1

Filter by User

Select specific users to see only their activities.
Use this to focus on specific team members or investigate user-specific issues.
2

Filter by Action Type

Choose from predefined action categories:
  • Authentication events
  • Transaction operations
  • User management
  • System configuration
  • Security events
  • API usage
3

Filter by Date Range

Select custom date ranges or use preset options:
  • Last 24 hours
  • Last 7 days
  • Last 30 days
  • This month
  • Custom range
4

Search Events

Use the search bar to find specific events:
  • Transaction IDs
  • User email addresses
  • Action descriptions
  • Resource names

Advanced Filters

Advanced Filtering Options

  • Resource Type: Filter by specific resources (transactions, users, products)
  • Severity Level: Focus on high-priority security events
  • Location: Filter by geographic location or IP address
  • Device Type: Filter by device or browser information
  • Status: Filter by event status (success, failure, pending)

Event Categories

Understanding different event categories helps you focus on relevant activities:

Security Events

security_events
object
High-priority events related to security and access control.

Financial Events

financial_events
object
Events related to money movement and financial operations.

Administrative Events

administrative_events
object
Events related to system administration and user management.

Compliance Benefits

Audit trails help meet various regulatory and compliance requirements:

Regulatory Frameworks

PCI DSS

  • Access control monitoring
  • User activity tracking
  • Security event logging
  • Regular audit reviews
  • Incident response documentation

GDPR

  • Data processing logs
  • User consent tracking
  • Access request monitoring
  • Data breach detection
  • Right to be forgotten tracking

SOX

  • Financial control monitoring
  • Change management tracking
  • Access authorization logs
  • System modification records
  • Audit trail preservation

HIPAA

  • Access control monitoring
  • Data access tracking
  • Security incident logging
  • User authentication records
  • System activity monitoring

Compliance Reporting

1

Generate Compliance Reports

Create reports for regulatory audits:
  • Access control summaries
  • User activity reports
  • Security incident logs
  • Change management records
2

Export Audit Data

Download audit logs in standard formats:
  • CSV for spreadsheet analysis
  • JSON for system integration
  • PDF for official documentation
  • XML for compliance systems
3

Archive Logs

Maintain long-term storage for compliance:
  • Automated archiving
  • Secure storage
  • Retention policies
  • Retrieval mechanisms

Security Monitoring

Use audit trails to detect and respond to security threats:

Threat Detection

Security Monitoring Indicators

  • Unusual Access Patterns: Login attempts from new locations
  • Privilege Escalation: Unexpected permission changes
  • Data Exfiltration: Large data exports or unusual access
  • Failed Authentication: Multiple failed login attempts
  • Suspicious API Usage: Unusual API call patterns

Alert Configuration

1

Set Up Alerts

Configure automated alerts for security events:
  • Failed login attempts (threshold-based)
  • Permission changes
  • Large data exports
  • API key generation
  • Suspicious IP addresses
2

Define Thresholds

Set appropriate thresholds for different event types:
  • Authentication failures (e.g., 5+ in 10 minutes)
  • Data access volume (e.g., 1000+ records)
  • API usage spikes (e.g., 2x normal rate)
  • Geographic anomalies (e.g., new countries)
3

Configure Notifications

Set up notification channels:
  • Email alerts to security team
  • Slack/Teams notifications
  • SMS for critical events
  • Integration with SIEM systems

Data Retention

Manage audit log retention according to your needs:

Retention Policies

Audit logs are retained according to your organization’s policies and regulatory requirements.

Retention Guidelines

  • Active Logs: 90 days for immediate access
  • Archived Logs: 7 years for compliance requirements
  • Security Events: Indefinite retention for critical events
  • Financial Records: 7+ years for tax and audit purposes

Data Management

1

Configure Retention

Set retention periods for different event types:
  • Security events: 7+ years
  • Financial events: 7+ years
  • User activity: 2-3 years
  • System events: 1-2 years
2

Archive Old Data

Move older logs to long-term storage:
  • Automated archiving
  • Compressed storage
  • Searchable archives
  • Secure backup systems
3

Data Disposal

Securely dispose of expired logs:
  • Secure deletion methods
  • Certificate of destruction
  • Compliance verification
  • Audit trail of disposal

Troubleshooting with Audit Logs

Use audit trails to diagnose and resolve issues:

Common Use Cases

Investigation Workflow

1

Identify the Issue

Determine what problem you’re investigating.
2

Set Time Range

Focus on the relevant time period for the issue.
3

Apply Filters

Use filters to narrow down relevant events.
4

Analyze Patterns

Look for patterns or anomalies in the data.
5

Document Findings

Record your investigation results and conclusions.

Best Practices

Audit Trail Best Practices

  • Regular Reviews: Conduct periodic audit log reviews
  • Automated Monitoring: Set up alerts for suspicious activity
  • Access Control: Limit audit log access to authorized personnel
  • Data Integrity: Ensure logs cannot be modified or deleted
  • Compliance Alignment: Align retention with regulatory requirements
  • Training: Train staff on audit log interpretation
  • Incident Response: Integrate audit logs into incident response
  • Continuous Improvement: Regularly update monitoring rules

Next Steps

Explore these related topics to enhance your audit and security practices: