#316 Add Audit Logging for All Secret Operations

closed high Created 2025-12-08 14:40 · Updated 2025-12-08 15:38

Description

Edit
## Problem No audit logging for secret operations. Only standard Python logging which is not: - Persistent in database - Queryable by tenant/user - Compliant with audit requirements ## Required Audit Events - SECRET_CREATED: path, keys (not values), user, timestamp - SECRET_UPDATED: path, keys changed, user, timestamp - SECRET_DELETED: path, user, timestamp - SECRET_READ: path, key accessed (workflow context), timestamp - SECRET_LIST: path queried, user, timestamp ## Acceptance Criteria - All secret operations logged to audit_logs table - Audit includes tenant_id, user_email, action, path, timestamp - Secret VALUES never logged - API endpoint to query secret audit: GET /tenant/secrets/<path>/audit - Audit retention policy configurable

Comments

Loading comments...

Context

Loading context...

Audit History

View All
Loading audit history...