Truthlocks maintains comprehensive audit logs for security monitoring, compliance reporting, and operational troubleshooting.Documentation Index
Fetch the complete documentation index at: https://docs.truthlocks.com/llms.txt
Use this file to discover all available pages before exploring further.
What’s Logged
Every API operation generates an audit event. This includes successful operations, failed attempts, and security-relevant events.API Operations
- Attestation minting * Attestation revocation * Issuer creation/modification * Key registration
Security Events
- Authentication failures * Permission denied * Rate limit exceeded * Suspicious activity
Governance Actions
- Issuer approval/rejection * Issuer suspension * Role assignments * API key management
User Activity
- User login/logout * Password changes * User invitations * Role changes
Audit Event Structure
Each audit event contains detailed context about what happened, who did it, and when:| Field | Type | Description |
|---|---|---|
actor_type | string | Who performed the action: USER, API_KEY, or SERVICE |
actor_id | string | UUID of the user, API key, or service that triggered the event |
action | string | The operation performed (e.g., attestation.mint) |
resource_type | string | Type of resource affected (e.g., attestation, issuer, user) |
resource_id | string | UUID of the affected resource |
service | string | The backend service that handled the request (e.g., trust-registry, audit-service) |
outcome | string | SUCCESS or FAILURE |
metadata | object | Action-specific context such as issuer ID, claim type, or error details |
integrity_hash | string | SHA-256 hash for tamper-evidence verification |
Querying Audit Logs
Basic Query
Filtered Query
Filter Parameters
| Parameter | Type | Description |
|---|---|---|
action | string | Filter by action type (e.g., attestation.mint) |
actor_id | string | Filter by user or API key ID |
resource_type | string | Filter by resource (attestation, issuer, user) |
from | datetime | Events after this time (ISO 8601) |
to | datetime | Events before this time (ISO 8601) |
limit | integer | Max events to return (default 50, max 1000) |
cursor | string | Pagination cursor for next page |
Policy decision audit trail
Every issuance policy evaluation is automatically recorded as an audit event. Each record captures thedecision_id, policy version, matched rules, evaluation time, and a SHA-256 hash of the input for tamper-evidence. Query policy decisions by filtering on resource_type=policy_decision:
Common use cases
Security investigation
Find all failed authentication attempts for a specific actor:Compliance Report
Export all attestation operations for a time period:User Activity Review
See everything a specific user did:Log retention
| Tier | Default retention | Export format |
|---|---|---|
| Free | 7 days | JSON only |
| Starter | 30 days | JSON, CSV |
| Professional | 90 days | JSON, CSV, SIEM integration |
| Enterprise | 1 year (custom available) | All formats + real-time streaming |
For compliance requirements exceeding your tier’s
retention period, configure SIEM integration to stream logs to your own
infrastructure.
Custom retention policies
You can configure how long audit logs are retained and whether expired logs are archived or permanently deleted. Set retention policies globally or per environment.| Field | Type | Description |
|---|---|---|
retention_days | integer | Days to keep audit logs (30–3,650) |
hard_delete | boolean | If true, permanently delete expired logs. If false, archive them. |
export_allowed | boolean | Whether audit exports are permitted for this scope |
environment_id | string | Optional. Apply this policy to a specific environment only. |
tenant.audit.retention.manage permission. Viewing settings requires tenant.audit.retention.read.
SIEM Integration
Enterprise customers can stream audit logs in real-time to external security information and event management (SIEM) systems.Supported providers
| Provider | Transport | Format |
|---|---|---|
| Splunk | HTTP Event Collector (HEC) | JSON |
| Datadog | Log Management API | JSON |
| AWS CloudWatch | Logs subscription | JSON |
| Elastic/ELK | Elasticsearch ingest | JSON |
| Custom webhook | HTTP POST | JSON |
Create a SIEM destination
provider with one of splunk, datadog, cloudwatch, elastic, or webhook. Each provider requires a destination endpoint and an authentication credential (token for Splunk, Datadog, and Elastic; access_key_id and secret_access_key for CloudWatch; secret for custom webhooks).
List SIEM destinations
Retrieve all configured streaming destinations for your tenant.Update a SIEM destination
Change the endpoint, credentials, or enabled state of an existing destination.Delete a SIEM destination
Remove a streaming destination. In-flight events are flushed before the destination is deleted.Delivery and buffering
Once enabled, every audit event is streamed to your destination in real time alongside the standard in-platform log. If the destination is unreachable, events are buffered and retried with exponential backoff for up to 24 hours. You can monitor delivery health in thestatus field returned by the list endpoint — possible values are active, degraded (retrying), and failed.
Next steps
SIEM integration
Stream audit events to Splunk, Datadog, CloudWatch, Elastic, or a custom webhook.
Compliance exports
Export audit data in SOC 2, GDPR, and HIPAA formats.
Abuse hardening
Detect and prevent abuse using audit data.
Rate limits
Understand rate limiting behavior in audit logs.

