Skip to main content

Logs

The Logs section provides visibility into all administrative actions and user login activity in your Prism organization. Logs are essential for security monitoring, compliance auditing, and troubleshooting.

Log Types

Prism provides two types of logs:

Log TypeDescriptionLink
Audit LogsRecords of all administrative actions performed in the Admin Portal (create, update, delete operations)Audit Logs
Access LogsRecords of user login activity, including successful and failed authentication attemptsAccess Logs

Audit Logs

Audit logs track every administrative action performed in the Admin Portal. This includes:

  • Creating, editing, and deleting users
  • Creating and deleting groups
  • Modifying group membership
  • Creating, editing, and deleting permission sets
  • Creating and deleting assignments
  • Onboarding and deleting AWS accounts
  • Changes to preferences and settings

See Audit Logs for detailed filtering and search capabilities.

Access Logs

Access logs track user authentication activity, including:

  • Successful logins (username/password and SSO)
  • Login source and method
  • Session information

See Access Logs for detailed filtering and statistics.

tip

Review logs regularly as part of your security posture. Look for unusual patterns such as unexpected administrative actions, or access from unusual locations.

Log Retention and Export

Prism retains logs for 90 days. Logs older than 90 days are automatically purged from Prism's database. For long-term retention and compliance, configure Log Export Settings to automatically export logs to an Amazon S3 bucket before they expire.


Audit Logs

Audit logs provide a comprehensive record of every administrative action performed in the Prism Admin Portal. Use audit logs to track changes, investigate incidents, and meet compliance requirements.

Overview

Every action performed in the Admin Portal is recorded in the audit log with details about what changed, who made the change, and when it occurred. Audit logs are immutable -- they cannot be edited or deleted.

Filters

The audit log table supports the following filters to help you find specific entries:

FilterTypeDescription
Action TypeDropdownFilter by the type of action: CREATE, READ, UPDATE, DELETE
Resource TypeDropdownFilter by the type of resource affected (e.g., User, Group, Permission Set, Assignment, AWS Account)
Date RangeDate pickerFilter logs to a specific time period (start date and end date)
UserText/DropdownFilter by the admin user who performed the action
StatusDropdownFilter by action status (success or failure)
tip

Combine multiple filters to narrow down the results. For example, filter by DELETE action type and Permission Set resource type to find all permission set deletions.

Audit Log Table

Table Columns

ColumnDescription
TimestampThe date and time when the action was performed
UserThe admin or API token that performed the action (e.g., akshat.gautam@clou... or API Token: Akshat TF)
ActionThe type of action performed: CREATE, UPDATE, or DELETE
ResourceThe type of resource affected (e.g., Permission Sets, Groups, Users)
DescriptionA summary of the action performed (e.g., "Delete permission set (ID: ...)", "Create a new group")
StatusThe HTTP status code of the action (e.g., 200 for success)
DurationHow long the action took to complete (e.g., 8ms, 138ms)
ActionsView icon to see additional details about the log entry

Expanding Details

Click on the Details column or the expand icon on any row to see additional information, such as:

  • The specific fields that were changed (for update actions)
  • The full resource data (for create actions)
  • Error messages (for failed actions)
  • Request metadata

Common Audit Queries

"Who deleted this user?"

  1. Set Action Type to DELETE.
  2. Set Resource Type to User.
  3. Adjust the Date Range to the suspected time period.
  4. Review the Performed By column.

"What changes were made today?"

  1. Set the Date Range to today's date.
  2. Leave other filters empty to see all actions.

"What did a specific admin do?"

  1. Set the User filter to the admin's username.
  2. Adjust the Date Range as needed.
  3. Review all actions performed by that admin.

"Were there any failed operations?"

  1. Set the Status filter to Failed.
  2. Review the details of each failed operation for error messages.

What Gets Logged

The following actions are recorded in the audit log:

Resource TypeLogged Actions
UserCreate, Edit, Delete, MFA changes, Group assignment changes
GroupCreate, Delete, Member additions and removals
Permission SetCreate, Edit, Delete, Policy changes
AssignmentCreate, Delete
AWS AccountOnboard, Rename, Owner changes, Delete
Identity ProviderConfiguration changes
Custom ApplicationCreate, Edit, Delete
PreferencesAdmin role changes, SCIM token operations, API token operations, Log export configuration

Access Logs

Access logs record all user authentication activity in your Prism organization, including successful logins, failed attempts, and session information. Use access logs to monitor login patterns, detect suspicious activity, and troubleshoot authentication issues.

Overview

Every authentication attempt is recorded in the access log. This provides a complete picture of who is logging in, when, how, and from where.

Filters

The access log table supports the following filters:

FilterTypeDescription
Date RangeDate pickerFilter logs to a specific time period (start date and end date)
User EmailTextFilter by the user's email address
AWS Account IDTextFilter by the AWS account ID accessed during the session
Permission SetDropdownFilter by the permission set used during the session
Login TypeDropdownFilter by the authentication method (e.g., username/password, Google SSO, Microsoft SSO)
tip

Use the User Email filter to investigate logins for a specific users. Combine with the Date Range to see a user's recent login history.

Access Log Table

The access log table displays individual login records with the following information:

ColumnDescription
TimestampThe date and time of the access event
User EmailThe email address of the user
TargetThe resource accessed -- either an AWS account (shown with account name and ID) or a custom application
Permission SetThe permission set used for the session, if applicable
Client IPThe IP address of the user's client
ActionsView icon to see additional details about the log entry

Common Access Log Queries

"When did a specific user last access a resource?"

  1. Set the User Email filter to the user's email.
  2. Set a broad Date Range (e.g., last 30 days).
  3. Sort by timestamp (most recent first).

"Who accessed a specific AWS account?"

  1. Filter by the AWS Account ID.
  2. Adjust the Date Range as needed.
  3. Review the list of users, their permission sets, and client IPs.

"Which permission set is a user accessing?"

  1. Set the User Email filter to the user's email.
  2. Filter by Permission Set to narrow results.
  3. Review the targets and timestamps.

Security Monitoring

Access logs are a key tool for security monitoring. Watch for:

PatternPotential Issue
Access from unexpected client IPsPossible unauthorized access
Unusual permission set usagePossible privilege escalation
Access at unusual timesPossible compromised account
Spike in access to a specific accountUnusual activity worth investigating
warning

If you detect suspicious activity, take immediate action: reset the affected user's password, and review their recent activity in the Audit Logs.