Skip to main content

Audit Trail

Also known as: Audit Log, Audit Logging

Chronological record of system events, user actions, and changes to data or configuration, retained in a form that can be replayed by an auditor or investigator to reconstruct what happened.

Written by Askara Solutions editorial team · Updated

An audit trail is what answers "who did what, and when?" after the fact. Auditors expect to see one for any control that materially affects security: access changes, privileged actions, configuration changes, evidence reviews, incident decisions. The expectation is rarely about the volume of logs; it is about whether the right events were captured, kept long enough, and protected from tampering.

Three properties separate a useful audit trail from a compliance artefact that nobody trusts. The events are recorded close to the source, so the timing and actor are reliable rather than reconstructed. The retention period is set deliberately, with reference to legal obligations and the realistic detection window for the incidents the organisation cares about. Access to the trail itself is controlled and reviewed, so an attacker who reaches the logs cannot quietly delete the evidence of their own activity.

The same trail serves multiple obligations. ISO 27001 Annex A.8.15 requires it. NIS2 requires evidence supporting incident notifications. GDPR Article 30 records of processing lean on it. The Askara Solutions agent treats the audit trail as derived from work the team is already doing, rather than a parallel logging stack to be assembled at the end of the year.

Related terms

  • Information Security Management System

    The documented set of policies, procedures, and accountability that an organisation uses to manage information-security risk over time.

  • Annex A

    The catalogue of 93 information security controls in ISO/IEC 27001:2022, organised into four themes (organisational, people, physical, technological), referenced from the Statement of Applicability.

  • Statement of Applicability

    ISO 27001 document that records, for every Annex A control, whether it is applied, why it is applied, and what evidence demonstrates that it operates.

  • Corrective Action

    Recorded response to a non-conformity or audit finding, describing the root cause, the remediation, the owner, and the evidence that closure has been verified.

Authoritative sources

Where to read more.