Does your Enterprise password manager audit access data?

Last updated by Github-actions[bot] 32 minutes ago.See history

Auditing access data is crucial for any enterprise to ensure security and compliance. Having an audit trail provides visibility into who accessed what data, when, and from where. An effective enterprise password manager should be able to offer this feature.

For example, Keeper (an enterprise-focused password product) is a leading enterprise password manager that offers a comprehensive auditing feature. It provides administrators with detailed logs and reports on user access, ensuring transparency and accountability.

keeper good example auditreport 1716517805958
Good Example: Keeper auditing shows exactly who opened what record

Why is Auditing Access Data Important?

  • Security Oversight: Monitoring who accesses data and when can identify potential security breaches or unauthorized access attempts.
  • Compliance: Many industry regulations mandate businesses to maintain a detailed audit trail of data access, especially for sensitive or personal data.
  • Accountability: An audit trail holds users accountable for their actions, discouraging misuse or unauthorized changes.

Finding Audit Data for a Particular Folder or Record in Keeper

  1. Get the UID of the folder/item: First get the UID of the folder or item that you want to audit.

    keeper getinteresing itemuuid
    Figure: First get the UID of the Folder/item for report

  2. Login to the Keeper Admin Console: Now switch to Keeper's admin console and login.
  3. Navigate to the 'Reporting & Alerts' Section: This allows an admin to create a custom report. Then add a new report. ::: greybox Tip - you can then create an alert from that report if required :::
  4. Apply Filters: You can filter the audit logs by various criteria, including user, date range, or specific activities. To find audit data for a particular folder or record, input its name or related keyword in the search or filter option.

    keeper applyfilters2
    Figure: Filter by the Event Type
    keeper applyfilters1
    Figure: Filter by Attributes - Category first
    keeper filtering the report
    Figure: Filter by Shared Folder / Item UID (Obtained from step 1)

  5. Filter Time/User: Choose any other filters such as Time Period or User and click apply.
  6. Review the Logs: Once filtered, you'll see a list of actions related to the chosen folder or record. This will include details like who accessed it, when, and from which device or location.

    keeper good example auditreport 1716517805958
    Figure: View the audit log

  7. Export or Save: If you wish to keep a record of the audit data outside of Keeper, you often have the option to export the data to various formats or save it for later review.

When selecting an enterprise password manager, auditing capabilities should be a priority. Keeper serves as a strong example of how detailed and user-friendly audit features can enhance security and transparency in data management.

We open source. Powered by GitHub