Monitoring & Operations

Audit Logs

What VaultGuard360 logs, 365-day retention, and how to use audit logs for compliance.

Audit Logs

VaultGuard360 maintains a comprehensive audit log of all scans and configuration changes. Audit logs are stored in Azure Table Storage within your managed resource group and in your Log Analytics workspace, with 365-day retention across all tiers.

Audit logs view
Audit logs view


What Gets Logged

Scan Events

Every scan execution produces an audit log entry containing:

  • Scan start and end timestamps
  • Correlation ID for tracing across log sources
  • Number of subscriptions scanned
  • Number of Key Vaults discovered
  • Total items scanned
  • Items found at each severity level (warning, severe, critical, expired)
  • Scan outcome (success, partial failure, timeout)

Configuration Changes

All configuration changes made through the dashboard or API are logged, including:

  • Alert threshold updates (warning, severe, critical day values)
  • Routing rule additions, modifications, and deletions
  • Email configuration changes (provider, SMTP settings)
  • Webhook channel configuration changes
  • Reminder mode changes
  • Settings updates (default notification email, per-threshold enable/disable)

Note: The audit log records that a configuration change occurred and what was changed. Webhook URLs, SMTP credentials, and other secrets are never written to the audit log.

Notification Events

Notification delivery attempts are logged, including:

  • Notification type (email, webhook, Teams)
  • Delivery timestamp
  • Target (email address or webhook channel type — not the URL itself)
  • Delivery outcome (success or failure)
  • Error details on failure

Retention

Audit logs are retained for 365 days across all tiers — Trial, Professional, and Enterprise.

Log StoreRetentionAccess
Azure Table Storage (AuditLog table)Deployment lifetimeDirect Table Storage query
Log Analytics workspace365 daysKQL queries via Log Explorer or Azure portal
Application Insights365 daysKQL queries via Log Explorer or Azure portal

The 365-day retention period meets the audit log retention requirements of SOC 2, ISO 27001, and HIPAA.


Compliance Use Cases

SOC 2 Evidence

Audit logs support multiple SOC 2 Trust Services Criteria:

CriterionHow Audit Logs Help
CC7.2 (Monitoring of System Operations)Scan execution records demonstrate continuous monitoring
CC7.3 (Evaluation and Communicating Security Events)Notification delivery logs demonstrate alert routing
CC6.1 (Logical Access)Configuration change logs show who changed access settings and when

Use the Log Explorer's CSV export to produce compliance evidence packages for auditors.

ISO 27001

Audit logs support A.12.4.1 (Event Logging) by maintaining records of:

  • System operations (scans)
  • Privileged actions (configuration changes)
  • Access events (authentication through Application Insights HTTP logs)

GDPR Article 30 (Records of Processing)

Audit logs provide the records of processing activities required under GDPR Article 30, including:

  • What data was accessed (Key Vault item metadata)
  • When it was accessed (scan timestamps)
  • The purpose (expiration monitoring)

Querying Audit Logs

From the Log Explorer

The dashboard's Log Explorer page provides a KQL query interface against your Log Analytics workspace. See the Log Explorer documentation for sample queries and export instructions.

From the Azure Portal

Navigate to your Log Analytics workspace in the Azure portal and run KQL queries directly:

// All scan events in the last 30 days
AppTraces
| where TimeGenerated > ago(30d)
| where Message contains "scan"
| project TimeGenerated, Message, Properties
| order by TimeGenerated desc

API Access

The /api/scans endpoint returns recent scan history in JSON format:

curl https://<function-app>.azurewebsites.net/api/scans \
  -H "Cookie: <your-session-cookie>"

Audit Log Security

Audit logs are stored in Azure Table Storage within your managed resource group. Access controls:

  • Read access: Any user authenticated to the dashboard can view audit logs via the dashboard and Log Explorer.
  • Write access: Only the Function App's managed identity writes to the audit log table. No user or external party can modify audit log entries.
  • Publisher access: The publisher (Sentinel Vault Systems) has zero access to your managed resource group and cannot view, query, or modify your audit logs.