How Is Log Management Performed in Wolkvox?
Table of Contents
Description
Wolkvox implements a to ensure traceability, security, and compliance for all activities performed on the platform. Logs are automatically generated for all critical actions, such as accesses, configurations, transactions, and security events. These records are protected with strict controls to ensure their confidentiality, integrity, and availability, and are retained for a minimum of 6 months, with the option to extend this period based on customer needs. Additionally, automatic alerts have been configured for relevant events, enabling a rapid response to incidents or suspicious activities.
Features
Log Generation and Storage
- : Detailed logs are captured for all actions performed by users, administrators, and systems within the platform.
- Log Protection: Logs are stored in secure environments, with to prevent tampering or unauthorized access.
- Flexible Retention: By default, logs are retained for 6 months, but this period can be extended upon customer request, .
Monitoring and Alerts
- Centralized Console: Audit logs are available in the wolkvox Manager module, where authorized users can consult and track them.
- Real-Time Alerts: Alerts are configured for critical events (e.g., unauthorized access attempts, changes to sensitive configurations), which are displayed in a dedicated console and allow for immediate response.
- Corrective Actions: Upon detection of a relevant event, the and applies the necessary measures to mitigate risks.