Audit Log Security

Keyfactor considers the security and integrity of the audit log to be of the utmost importance and takes steps to ensure that transactions are recorded to the audit log accurately and retained without tampering until they are purged (by default, after 7 years—see Application Settings: Auditing Tab).

When Keyfactor Command is installed, a 64-byte key is generated for use in securing audit logs. This key is unique for the implementation. The key is encrypted and stored in the secrets table in SQL using either SQL-level encryption or application-level encryption, depending on the level of encryption selected during installation (see Database Tab in the Keyfactor Command Server Installation Guide). If application-level encryption is selected, use of a hardware security module (HSM) is supported. For more information, see Acquire a Public Key Certificate for the Keyfactor Command Server in the Keyfactor Command Server Installation Guide.

When an audit log record is created, the key components of it are signed using the unique 64-byte key and stored in the SQL database. The signature is retained and tracked. When the audit log is read, it is validated using the signature. If the signature does not match, the audit log is flagged as invalid (see Validate), as this could indicate that the record has been tampered with. The following data is included in the key components:

In order to access the audit logs, users must be granted the Read role permission for the Auditing role (see Security Roles and Identities). Users with auditing Read permissions are allowed to access the audit log page and make APIClosed A set of functions to allow creation of applications. Keyfactor offers the Keyfactor API, which allows third-party software to integrate with the advanced certificate enrollment and management features of Keyfactor Command. requests to obtain data from the audit log.

Important:  Be aware that this permission essentially grants a user global read access to the product since the user will be able to view, from the audit log, many of the actions being taken in Keyfactor Command.

Figure 388: Security Role Showing Auditing Permissions Setting