Audit Logs & Evidence Trails
Ensure audit logs and compliance evidence are securely collected, validated, and retained across AWS, Azure, GCP, and Sprinto to meet audit readiness and monitoring requirements.
Audit logging is a foundational compliance requirement that enables traceability, incident investigation, and accountability. Sprinto monitors whether critical systems are configured to generate, retain, and protect audit logs. It also verifies the presence of evidence trails for high-risk actions and access events.
This article explains how Sprinto evaluates audit log readiness, what platforms are covered, and how to resolve failing monitors related to audit logs and evidence trails.
What is Monitored
Sprinto tracks the following categories of audit and evidence logging:
System Audit Logs
Records of login activity, user changes, permission escalations
Events tracked in cloud platforms, IAM tools, and critical systems
Configuration Change Logs
Infrastructure policy changes (e.g., firewall rules, storage settings)
Admin changes, permission updates, and role assignments
Evidence Trails for Compliance
Screenshots, reports, or workflow data that support completed checks
Auto-collected or manually submitted by teams during reviews
Log Integrity & Tamper-Proofing
Validation settings for tools like AWS CloudTrail
Secure delivery and immutability of logs
Platforms & Services Monitored
AWS
CloudTrail setup, log validation, storage config
Azure
Activity logs, Diagnostic settings
Google Cloud
Audit logs via Cloud Audit Logging
GitHub/GitLab
Repository changes, permission updates
Okta
Authentication events, group/app assignment changes
Sprinto
Workflow evidence trails and check-level submissions
Key Monitors and How to Resolve
1. AWS CloudTrail: Log-File Integrity Validation Should Be Enabled
What it checks: Log validation is enabled to detect tampering with AWS CloudTrail logs
How to resolve:
Go to CloudTrail > Trails
Select your trail → Click Edit
Enable Log file validation
Ensure logs are being delivered to a versioned, encrypted S3 bucket
2. Azure: Diagnostic Settings Should Be Enabled
What it checks: Diagnostic logs are being collected for key services (e.g., NSGs, SQL, Storage)
How to resolve:
Navigate to a resource (e.g., NSG, Storage)
Go to Monitoring > Diagnostic settings
Enable AuditLogs, Metrics, and AllLogs
Route to Log Analytics or a storage account
3. GCP: Cloud Audit Logs Must Be Active
What it checks: Admin activity logs and data access logs are enabled for GCP resources
How to resolve:
Go to IAM & Admin > Audit Logs
Enable logging for each service under Admin Read, Data Write, and Data Read
Set retention and destination (Cloud Logging or Storage)
4. Sprinto: Evidence Must Be Uploaded for Manual Checks
What it checks: Evidence is present for manually scoped workflow checks or assessments
How to resolve:
Go to Monitoring > Check History
Locate failing check → Click Upload Evidence
Attach relevant files (e.g., screenshots, PDFs)
Click Mark as Resolved
Best Practices
Enable logging for all privileged actions and high-risk systems
Store logs in encrypted, write-once storage (e.g., versioned S3 buckets)
Enforce retention policies per framework (e.g., SOC 2, ISO 27001)
Automate evidence collection where possible (e.g., Sprinto workflow integrations)
Audit logs quarterly for gaps or anomalies
Last updated