Audit Logs
Coming Soon
This feature is currently under development. Documentation will be updated as the feature becomes available.
Overview
Audit Logs provide a comprehensive record of user activity, system changes, and data access across the DutyCall platform for security, compliance, and troubleshooting purposes.
Planned Capabilities
User Activity Tracking
- Authentication Events: Login, logout, failed attempts
- Data Access: Who viewed or exported what data
- Configuration Changes: Settings modifications with before/after values
- Permission Changes: Role and access control updates
System Event Logging
- API Calls: Track all programmatic access
- Data Exports: Record all bulk data downloads
- Integrations: Third-party system access
- Security Events: Anomalies, suspicious activity, policy violations
Log Retention & Export
- Searchable Interface: Filter by user, action, date, resource
- Long-Term Storage: Retain audit logs per compliance requirements
- Export Capabilities: Download logs for external analysis
- Real-Time Alerts: Notifications for critical events
Audit Log Fields
Each audit log entry will include:
- Timestamp: When the event occurred
- User: Who performed the action (username, role, IP address)
- Action: What was done (created, updated, deleted, exported, etc.)
- Resource: What was affected (call record, user account, setting, etc.)
- Details: Specific changes or parameters
- Result: Success or failure
- Session ID: Link to authentication session
Use Cases
Security & Compliance
- SOC 2 / ISO 27001: Demonstrate access controls and monitoring
- HIPAA: Track access to protected health information
- Incident Response: Investigate security events
- Forensic Analysis: Reconstruct timeline of events
Operational Transparency
- Change Tracking: "Who changed this setting and when?"
- Access Verification: "Did this user access this data?"
- Troubleshooting: "What happened before the system behaved unexpectedly?"
Legal & Regulatory
- Evidence Preservation: Support litigation or investigations
- Compliance Audits: Demonstrate proper controls to auditors
- Data Subject Requests: Prove compliance with privacy laws
Audit Log Examples
User Login
{
"timestamp": "2025-10-11T14:23:15Z",
"user": "jane.doe@company.com",
"action": "authentication.login.success",
"ip_address": "203.0.113.42",
"session_id": "sess_abc123",
"details": {
"method": "sso",
"provider": "okta"
}
}
Data Export
{
"timestamp": "2025-10-11T14:30:00Z",
"user": "admin@company.com",
"action": "data.export.completed",
"resource": "voice_call_records",
"ip_address": "203.0.113.42",
"session_id": "sess_xyz789",
"details": {
"date_range": "2025-09-01 to 2025-09-30",
"format": "csv",
"record_count": 1523,
"file_size_mb": 12.4
}
}
Configuration Change
{
"timestamp": "2025-10-11T15:45:30Z",
"user": "admin@company.com",
"action": "settings.retention_policy.updated",
"resource": "voice_recordings",
"ip_address": "203.0.113.42",
"session_id": "sess_xyz789",
"details": {
"before": "90 days",
"after": "180 days",
"reason": "compliance requirement update"
}
}
Related Documentation
Want to discuss audit logging requirements? Contact your account representative.