Skip to content

6M.1.DEMO: Registration: Display audit trail for access to restricted data


Establish an approach to provide audit trails for access to restricted data.

What they achieved

This slide deck shows a very high level workflow of how events are logged as part of the Gen3 tools and then passed to the ELK stack for auditing and analysis, while the video demo containts a very rich and full feature set for auditing and logging in their stack.

Why is this valuable?

With some of the databases available for study being restricted to particular users, auditing and logging functions must be available to provide security reports to make sure that access is only available to authorized users as part of the KC6 guidelines.