Audit logging is a core component of security compliance within IBM Instana. The Access Logs, a section under Audit Logs, are specifically designed to capture and display authentication-related events. IBM states: "Access logs in Instana record user login and logout activity, including timestamps, user IDs, and source IP addresses." This capability supports auditing, regulatory needs, and incident response by ensuring verifiable tracking of system access. Instana separates audit events into categories for clarity: user actions, configuration edits, and security operations, with host-based access details residing in the ‘Access Logs’ view. This delineation enables administrators to spot unauthorized or suspicious access attempts quickly. Additions of new users or API tokens fall under distinct event categories (‘User Management’ and ‘API Audit Logs’) but not under the Access logs specifically. Through its clear segregation of logs by purpose, Instana ensures that organizations maintain compliance with frameworks like ISO 27001, SOC 2, and internal IT governance policy, as access auditability provides both transparency and accountability across multi-user environments.
[Reference: IBM Instana Observability Documentation (v1.0.307) – Security and Audit Logs Configuration.]
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit