You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Create extended comprehensive documentation for the Audit Log to ensure transparency and clarity regarding its modifications, storage, encryption, and usage.
Use Case:
"Identify Modifications Within a Specific Time Period"
Outline how to retrieve information about:
What modifications have been made within a defined timeframe.
Who made the changes (user identification, role, etc.).
Include sample queries or API calls (if applicable).
Proposed Solution
Tasks: Storage Details:
Describe how the audit log is stored (e.g., database, file system, cloud storage).
Specify data retention policies and backup strategies.
Encryption & Security:
Explain the encryption mechanisms in place (at-rest, in-transit).
Detail access control and security protocols to safeguard the audit log.
Usage Information:
Provide examples of how the audit log can be queried or accessed.
Clarify what specific data points are included in the log (e.g., timestamps, user IDs, actions).
Acceptance Criteria
Clear, structured documentation is available in the repository.
Includes technical details, use cases, and examples.
Reviewed and approved by the relevant technical lead or team.
Additional Information
No response
The text was updated successfully, but these errors were encountered:
Problem Description
Create extended comprehensive documentation for the Audit Log to ensure transparency and clarity regarding its modifications, storage, encryption, and usage.
Current state of documentation: https://github.com/SORMAS-Foundation/SORMAS-Project/wiki/Auditing-&-Data-History
Use Case:
"Identify Modifications Within a Specific Time Period"
Outline how to retrieve information about:
Proposed Solution
Tasks:
Storage Details:
Describe how the audit log is stored (e.g., database, file system, cloud storage).
Specify data retention policies and backup strategies.
Encryption & Security:
Explain the encryption mechanisms in place (at-rest, in-transit).
Detail access control and security protocols to safeguard the audit log.
Usage Information:
Provide examples of how the audit log can be queried or accessed.
Clarify what specific data points are included in the log (e.g., timestamps, user IDs, actions).
Acceptance Criteria
Additional Information
No response
The text was updated successfully, but these errors were encountered: