Logging the Events
As an administrator, you have access to a log of the activities within the organization. The log records events such as changes to the role-based access control configuration, user login or logout, and so on.
By collecting and analyzing these logs, you can—
-
Proactively monitor: Track the access and configuration changes in real-time to quickly identify potential issues or unauthorized changes.
-
Investigate security incidents: Examine what changes were made in the organization, by whom, and when, to understand and respond to security incidents effectively.
-
Maintain accountability: Ensure that users and administrators are accountable for their actions within the system.
-
Manage role-based access control changes: Ensure that the modifications to the role-based access control system do not impact the security or functionality of the system.
The system logs the following types of events.
-
Role management events such as assigning or removal of roles to users and groups.
-
Group management events such as adding or removing users from a group, creating or deleting groups, and mapping groups.
-
User activity events such as login, logout, password resets, multifactor authentication (MFA) changes, adding or removing a user from the organization, and so on.