Skip to main content

Audit Log

The workspace audit log provides a complete, tamper-evident record of all significant actions taken within a workspace. Every change -- from creating an asset to viewing a credential -- is logged with the user who performed it, the timestamp, and the IP address from which the action originated.

Workspace audit log

How It Works

Every workspace in Hawkra maintains its own audit log. When a user performs an action that modifies data or accesses sensitive information, Hawkra automatically records an entry containing:

  • Who -- The user who performed the action (user ID and email).
  • What -- The action type and the resource affected.
  • When -- The exact timestamp of the action.
  • Where -- The IP address from which the request was made.
  • Details -- Additional context where applicable (e.g., the name of the resource, a description of the change).

Audit log entries are immutable -- they cannot be edited or deleted by any user, including the workspace owner. All workspace members (Owner, Editor, Remediation Analyst, and Viewer) can view the audit log.

What Actions Are Logged

Hawkra logs a comprehensive set of actions across all workspace features:

Workspace Management

ActionDescription
workspace.createA new workspace was created.
workspace.updateWorkspace settings were modified (name, description, status, dates).
workspace.deleteThe workspace was deleted.
workspace.rotate_encryption_keyAn encryption key rotation was initiated.
dashboard_layout.updateThe workspace dashboard layout was saved.

Team and Invitations

ActionDescription
invitation.createA team member invitation was sent.
invitation.acceptAn invitation was accepted.
invitation.declineAn invitation was declined.
invitation.cancelA pending invitation was cancelled.
member.role_changeA member's role was changed.
member.removeA member was removed from the workspace.

Assets, Networks, and Ports

ActionDescription
asset.createA new asset was added.
asset.updateAn asset was modified.
asset.deleteAn asset was deleted.
asset.import_mac_dataMAC address data was imported for assets.
network.createA new network was created.
network.updateA network was modified.
network.deleteA network was deleted.
port.createA new port was added to an asset.
port.updateA port was modified.
port.deleteA port was deleted.

Vulnerabilities

ActionDescription
vulnerability.createA new vulnerability was created.
vulnerability.updateA vulnerability was modified.
vulnerability.deleteA vulnerability was deleted.
vulnerability.created_from_libraryA vulnerability was created from the shared library.
vulnerability.saved_to_libraryA vulnerability was saved to the shared library.
vulnerability_asset.linkA vulnerability was linked to an asset.
vulnerability_asset.unlinkA vulnerability was unlinked from an asset.
vulnerability_asset.status_changeThe status of a vulnerability-asset link was changed.

Sensitive Data Access

ActionDescription
credential.view_sensitiveA user viewed the decrypted value of a credential. This is logged as sensitive access.
credential.createA new credential was stored.
credential.updateA credential was modified.
credential.deleteA credential was deleted.

Scans and Imports

ActionDescription
scan.createA new scan was initiated.
scan.cancelA running scan was cancelled.
scan.deleteScan results were deleted.
import.createScan data was imported (e.g., Nessus, Nmap files).

Compliance

ActionDescription
compliance.select_frameworkA compliance framework was selected for the workspace.
compliance.deselect_frameworkA compliance framework was deselected.
compliance.update_responseA compliance control response was updated.
compliance.add_evidenceEvidence was attached to a compliance control.
compliance.delete_evidenceEvidence was removed from a compliance control.
compliance.auto_populateCompliance controls were auto-populated from workspace data.

Reports, Exports, and Documents

ActionDescription
report.generateA report was generated.
export.assetsAsset data was exported.
export.vulnerabilitiesVulnerability data was exported.
export.complianceCompliance data was exported.
document.createA document was created.
document.updateA document was modified.
document.deleteA document was deleted.
file.uploadA file was uploaded.
file.deleteA file was deleted.

Remediation

ActionDescription
remediation.assignA vulnerability was assigned for remediation.
remediation.unassignA remediation assignment was removed.
remediation.commentA comment was added to a remediation task.

Other

ActionDescription
note.createA note was created.
note.updateA note was modified.
note.deleteA note was deleted.
agent.deployA scan agent was deployed.
agent.approveA scan agent was approved.
agent.revokeA scan agent was revoked.
agent.deleteA scan agent was deleted.
agent_task.createA task was assigned to a scan agent.
agent_task.cancelAn agent task was cancelled.
agent_task.deleteAn agent task was deleted.
ai.messageAn AI assistant message was sent.
proof.createA proof of finding was created.
proof.updateA proof of finding was modified.
proof.deleteA proof of finding was deleted.
Sensitive Access Logging

Credential views are logged as sensitive access events (credential.view_sensitive). Every time a user decrypts and views a stored credential, it is recorded with their identity and IP address. This provides a clear chain of custody for sensitive data.

Key Actions

Viewing the Audit Log

  1. Navigate to the workspace.
  2. Open the Audit Log section (or view the Audit Log widget on the dashboard).
  3. Browse the paginated list of events, showing the most recent actions first.

Each entry displays the user's email, the action performed, the resource type and ID, any additional details, the originating IP address, and the timestamp.

Pagination

The audit log is paginated with a default of 50 entries per page (up to 100). Use the page controls to navigate through the history.

Tips and Notes

Using the Audit Log for Compliance

The audit log serves as evidence for compliance frameworks that require proof of access controls and change management. You can reference audit log entries to demonstrate who accessed what data and when, which is valuable for SOC 2, ISO 27001, PCI DSS, and similar standards. Export your workspace's compliance data to include audit trail evidence in your compliance reports.

  • Immutable records -- Audit log entries cannot be modified or deleted by any user. They are a trustworthy record of what happened.
  • All roles can view -- Every workspace member, regardless of role, can view the audit log. This transparency helps teams maintain accountability.
  • IP address tracking -- Each action records the IP address it originated from, which helps identify unauthorized access or unusual activity.
  • Dashboard widget -- You can add the Audit Log widget to your workspace dashboard for quick access to recent activity without leaving the overview page.