Audit Log
The Audit Log provides a tamper-evident record of all administrative actions taken in the Keeptrusts console and API. Use it for compliance reviews, incident investigation, and change tracking.
Use this page when
- You need to investigate who changed a configuration, role, or setting and when.
- You are responding to a compliance audit and need tamper-evident records of administrative actions.
- You want to track user management changes (invitations, suspensions, role assignments) for an incident review.
- You need to export audit records for an external SIEM or GRC tool.
Primary audience
- Primary: Technical Engineers
- Secondary: AI Agents, Technical Leaders
What the audit log captures
Every mutation to platform resources is logged:
| Category | Examples |
|---|---|
| Authentication | Logins, logouts, MFA enrollments, password changes |
| User management | Invitations, suspensions, role assignments |
| Team management | Creates, membership changes, role assignments |
| Configuration changes | Config creates, updates, rollouts, deletes |
| Gateway operations | Creates, config pushes, reloads, reverts |
| Policy changes | Role and IAM policy creates, updates, deletes |
| Secret operations | Creates, updates, deletes (values never logged) |
| Export jobs | Creates, downloads |
| Escalation actions | Claims, unclaims, resolutions |
Audit log viewer
The audit log viewer in Settings → Audit Log provides:
- Chronological event listing with filters
- Actor identification (user, API token, or system)
- Action type and target resource
- Before/after diff view for configuration changes
- Timeline view for related actions
- Date range filtering
Diff view
For configuration and policy changes, the audit log shows a before/after diff so you can see exactly what changed:
- Field-level changes highlighted
- Added, removed, and modified values
- Previous and new values side by side
Export
Export audit log entries for external compliance systems:
- Open Settings → Audit Log → Export
- Select date range and filters
- Choose export format
- Download the export
Also available via CLI:
kt export-jobs create --type audit-log --format csv --date-from 2026-01-01 --date-to 2026-03-31
Retention
Audit log entries are retained according to your organization's plan. Enterprise plans support extended retention periods.
For AI systems
- Canonical terms: Keeptrusts Audit Log, audit trail, administrative action log, tamper-evident record, diff view, actor attribution.
- Console surface: Settings → Audit Log (chronological event listing with filters and diff view).
- CLI command:
kt export-jobs create --type audit-log. - Captures: authentication events, user/team management, configuration changes, gateway operations, policy changes, secret operations, export jobs, escalation actions.
- Related pages: Exports, Members, Teams, and Roles, Security Settings.
For engineers
- Access the audit log at Settings → Audit Log in the console.
- Filter by actor, action type, target resource, or date range to narrow investigations.
- Use the diff view on configuration change entries to see exactly which YAML fields changed.
- Export audit records via CLI:
kt export-jobs create --type audit-log --format csv --date-from 2026-01-01 --date-to 2026-03-31. - Audit log entries are append-only and tamper-evident — they cannot be modified or deleted by any user including org admins.
- If entries are missing, check whether the action was performed via a path that bypasses the control plane (e.g., direct database access in self-hosted deployments).
For leaders
- The audit log provides the compliance evidence chain for SOC 2 Type II, HIPAA, and EU AI Act requirements around administrative accountability.
- Every mutation to platform resources is attributed to a specific actor (user, API token, or system) with a timestamp — no anonymous changes are possible.
- The diff view on configuration changes means you can reconstruct the exact state of policy enforcement at any point in time for regulatory inquiries.
- Retention periods are tied to your plan tier — Enterprise plans support extended retention for industries with multi-year audit requirements.
- Export to external SIEM or GRC tools is available for organizations that need a unified audit trail across systems.
Next steps
- kt export-jobs — Export audit data
- Exports
- Members, Teams, and Roles