Toggle menu

Cloud Security Principles

Audit Information for Users

You should be provided with the audit records needed to monitor access to your service and the data held within it. The type of audit information available to you will have a direct impact on your ability to detect and respond to inappropriate or malicious activity within reasonable timescales.

NCSC - Audit Information for Users

You have complete control over the users who are able to access the management interfaces of your platform/solution and the data stored within it. You can perform audits of user permissions, view logs of user access and generate reports of user activity on demand.

We do not make public the audit information of the underlying cloud infrastructure.

Last modified on January 19, 2022

Share this page

Facebook icon Twitter icon email icon

Print

print icon