StellarBase
Docs Security & Compliance Audit Log
Security & Compliance

Audit Log

Immutable record of every action — who did what, when, and why. Exportable for audits, regulators, ethics committees, and court proceedings.

What’s logged

Everything that affects data or policy. The full list:

Authentication & sessions

  • Login, logout, session creation, session revocation
  • MFA challenges and outcomes
  • SSO redirects and assertions
  • API key creation, rotation, revocation
  • Failed auth attempts (rate-limited)

Reads

  • Document previews
  • Search queries and their results
  • Agent queries and responses
  • API calls with their endpoints

Writes

  • Document ingestion (with source provenance)
  • Agent prompt changes (with before/after diff)
  • Workflow changes (with before/after diff)
  • Permission changes
  • Dictionary and rule changes (for StellarGate)

Reviews & approvals

  • Every HITL decision (approve / modify / reject) with reasoning
  • Every comment with its author and timestamp
  • Every workflow-gate approval

Admin actions

  • User additions, role changes, deletions
  • Group changes
  • Integration configuration changes
  • Billing actions

LLM interactions

  • Every external LLM call — target provider, model, token counts, duration
  • StellarGate anonymization mappings (resolution events, not the mappings themselves)

What’s not logged

For privacy reasons, some things are deliberately excluded:

  • Raw content of documents (they’re already in the knowledge base — no duplication in audit log)
  • PII values inside anonymization mappings (access to mappings is separately audited)
  • Full prompt / completion bodies (configurable — off by default for privacy)

You can enable full-content logging per Base if your compliance framework requires it. Storage footprint increases significantly.

Log structure

Each audit event is a structured, machine-readable record — actor, action, target, outcome, timestamps, and the context needed to trace one request end-to-end. Records are easy to filter and export to any SIEM.

Immutability

Audit records are write-once. No edit, no delete — including by admins. Retention is configurable (default 7 years for paid plans), after which records are automatically purged. Before purge, you can export to long-term archive.

Storage

Audit records are stored separately from application data, in append-only storage with integrity checks. Write rate is guaranteed not to impact application latency — if the audit pipeline is backed up, it queues; application writes never block.

Search & filter

The admin UI lets you filter by:

  • Actor (user, group, agent)
  • Resource (Base, collection, document)
  • Action type
  • Time range
  • Outcome (success / failure)
  • Correlation ID (trace a single request through the system)

Export

Three options:

Manual (UI / API)

Filter, preview, download as CSV / JSON. For ad-hoc investigations.

Continuous (SIEM integration)

Stream events to Splunk, Elastic, Datadog, Sumo Logic, Azure Sentinel, AWS Security Hub. Events flow in near-real-time (typical delay < 5 seconds).

Scheduled export

Automated export on a schedule (daily / weekly / monthly) to an S3 bucket or SFTP server of your choice. Signed manifest included for integrity verification.

Compliance use cases

GDPR subject access request

Filter the audit log by actor = subject_id or by documents referencing the subject. Produces the “record of processing” required by Article 30.

SOC 2 / ISO 27001 audit

Auditor gets read-only access to the audit log filtered to the scope period. No access to underlying data — only the metadata.

Legal discovery

For litigation support, the correlation ID lets you reconstruct exactly how a specific decision was made — who accessed what, when, and in what order.

Internal investigation

Suspicious activity review. Filter by user, by unusual access patterns, by failed-authorization events.

Tamper evidence

Each append-only segment is cryptographically chained — altering a past record breaks the chain and is detectable on the next integrity check. Integrity checks run automatically daily and on-demand.

Related