The workspace audit log provides a complete, tamper-evident record of all significant actions taken within a workspace. Every change -- from creating an asset to viewing a credential -- is logged with the user who performed it, the timestamp, and the IP address from which the action originated.
Every workspace in Hawkra maintains its own audit log. When a user performs an action that modifies data or accesses sensitive information, Hawkra automatically records an entry containing:
Who -- The user who performed the action (user ID and email).
What -- The action type and the resource affected.
When -- The exact timestamp of the action.
Where -- The IP address from which the request was made.
Details -- Additional context where applicable (e.g., the name of the resource, a description of the change).
Audit log entries are immutable -- they cannot be edited or deleted by any user, including the workspace owner. All workspace members (Owner, Editor, Remediation Analyst, and Viewer) can view the audit log.
Credential views are logged as sensitive access events (credential.view_sensitive). Every time a user decrypts and views a stored credential, it is recorded with their identity and IP address. This provides a clear chain of custody for sensitive data.
Open the Audit Log section (or view the Audit Log widget on the dashboard).
Browse the paginated list of events, showing the most recent actions first.
Each entry displays the user's email, the action performed, the resource type and ID, any additional details, the originating IP address, and the timestamp.
The audit log serves as evidence for compliance frameworks that require proof of access controls and change management. You can reference audit log entries to demonstrate who accessed what data and when, which is valuable for SOC 2, ISO 27001, PCI DSS, and similar standards. Export your workspace's compliance data to include audit trail evidence in your compliance reports.
Immutable records -- Audit log entries cannot be modified or deleted by any user. They are a trustworthy record of what happened.
All roles can view -- Every workspace member, regardless of role, can view the audit log. This transparency helps teams maintain accountability.
IP address tracking -- Each action records the IP address it originated from, which helps identify unauthorized access or unusual activity.
Dashboard widget -- You can add the Audit Log widget to your workspace dashboard for quick access to recent activity without leaving the overview page.