Overview
Audit Logs in Bifrost provide complete visibility into security-critical events, user activities, configuration changes, and data access patterns. Enterprise audit logging ensures compliance with regulatory requirements including SOC 2, GDPR, HIPAA, and ISO 27001 through comprehensive, immutable audit trails.Key Features
| Feature | Description |
|---|---|
| Immutable Logs | Tamper-proof audit trails with cryptographic verification |
| Real-Time Capture | Instant logging of all security-relevant events |
| Granular Filtering | Query by user, action, resource, or time range |
| Long-Term Retention | Configurable retention policies for compliance |
| SIEM Integration | Export to Splunk, Datadog, Elastic, and more |
| Alert Triggers | Automated alerts on suspicious activities |
What Gets Logged
Authentication Events
- User login (successful/failed)
- User logout
- Session creation/expiration
- MFA verification
- Password changes
- Failed authentication attempts
- Account lockouts
- SSO redirects
Authorization Events
- Model access attempts
- Provider access checks
- Virtual key usage
- Budget limit checks
- Rate limit violations
- Permission denials
Configuration Changes
- Virtual key creation/modification/deletion
- Team/customer creation/updates
- User provisioning/deprovisioning
- Budget adjustments
- Rate limit changes
- Provider key updates
- Guardrail configuration changes
- SAML/OIDC settings updates
Data Access Events
- PII detection and handling
- Data export operations
- Log access and queries
- Sensitive configuration access
- API key exposure attempts
Security Events
- Prompt injection attempts
- Jailbreak attempts
- Unusual access patterns
- Multiple failed authentication attempts
- API key abuse
- Rate limit violations
- Suspicious IP addresses
- Guardrail violations
Configuration
Basic Audit Logging Setup
- config.json
- Environment Variables
Advanced Configuration
Querying Audit Logs
API-Based Queries
Query Authentication Events:Advanced Filtering
Response Format
SIEM Integration
Splunk Integration
Datadog Integration
Elastic Security Integration
Webhook Integration
Compliance Reporting
Generate Audit Reports
Report Types
| Report Type | Description | Use Case |
|---|---|---|
| Access Audit | All user authentication and access events | SOC 2, ISO 27001 |
| Change Audit | Configuration and permission changes | Change management |
| Security Audit | Security incidents and violations | Security reviews |
| Compliance Report | Framework-specific compliance evidence | Regulatory audits |
| User Activity | Individual user activity summary | HR investigations |

