You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/pipelines/audit_log.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -113,7 +113,7 @@ You can also set up [Amazon EventBridge](/docs/integrations/amazon-eventbridge)
113
113
114
114
115
115
Audit logs record information of transactions in which secrets are accessed or modified. The following events will be logged:
116
-
*`SECRET_CREATED` This triggers an audit log when a user of an organization that initiated the creation of a secret. Secrets can only be created by a User. Below are the fields captured in the audit log for this event.
116
+
*`SECRET_CREATED` This triggers an audit log when a user of an organization initiates the creation of a secret. Secrets can only be created by a user. Below are the fields captured in the audit log for this event.
117
117
118
118
```
119
119
{
@@ -140,7 +140,7 @@ Audit logs record information of transactions in which secrets are accessed or m
140
140
}
141
141
```
142
142
143
-
*`SECRET_DELETED` This triggers an audit log when a secret is deleted by a user of an organization. This is only for when a secret is destroyed, and there is no handling for events such as "revoked" or "expiry". Below are the fields captured in the audit log for this event.
143
+
*`SECRET_DELETED` This triggers an audit log when a secret is deleted by a user of an organization. This applies exclusively to the destruction of a secret; events related to the revocation or expiration of a secret will not trigger audit logs. Below are the fields captured in the audit log for this event.
144
144
```
145
145
{
146
146
"data" => {
@@ -193,7 +193,7 @@ Audit logs record information of transactions in which secrets are accessed or m
193
193
}
194
194
```
195
195
196
-
*`SECRET_QUERIED` This triggers an audit event when a user belonging to an organization or system identity (such as an agent) when a query is performed to find a secret (or secrets). This event will still trigger if a secret is searched for but does not exist or is not found. Below are the fields captured in the audit log for this event.
196
+
*`SECRET_QUERIED` This triggers an audit event when a user belonging to an organization or system identity (such as an agent) when a query is performed to find a secret (or secrets). This event will be triggered even if a search for a secret yields no results or if the secret does not exist. Below are the fields captured in the audit log for this event.
197
197
```
198
198
{
199
199
"data" => {
@@ -219,7 +219,7 @@ Audit logs record information of transactions in which secrets are accessed or m
219
219
}
220
220
```
221
221
222
-
*`SECRET_UPDATED` This triggers an audit event when the value or properties of a secret is updated by a user belonging to an organization. As secrets can have many versions, audit logs keeps track of the version identifiers and updates. Below are the fields captured in the audit log for this event.
222
+
*`SECRET_UPDATED` This triggers an audit event whenever a user within an organization updates the value or properties of a secret. Given that secrets can exist in multiple versions, the audit logs maintain records of these version identifiers and their corresponding updates. Below are the fields captured in the audit log for this event.
0 commit comments