Cloud Security Principles
Audit Information for Users
You should be provided with the audit records needed to monitor access to your service and the data held within it. The type of audit information available to you will have a direct impact on your ability to detect and respond to inappropriate or malicious activity within reasonable timescales.
NCSC - Audit Information for Users
You have complete control over the users who are able to access the management interfaces of your platform/solution and the data stored within it. You can perform audits of user permissions, view logs of user access and generate reports of user activity on demand.
We do not make public the audit information of the underlying cloud infrastructure.
Last modified on January 19, 2022