Compliance Considerations#
Audience: Security Professionals, Compliance Officers
Prerequisites: Understanding of security compliance requirements
Outcome: Understand Kleidia’s compliance features and audit capabilities
Overview#
Kleidia provides comprehensive audit logging and compliance features to meet enterprise security and regulatory requirements. The system logs all operations, maintains complete audit trails, and provides reporting capabilities.
Audit Logging#
What is Logged#
All operations are logged for compliance:
User Actions#
- Authentication: Login, logout, failed login attempts
- Device Operations: Registration, PIN/PUK changes, certificate operations
- Profile Changes: Password changes
Administrative Actions#
- User Management: User creation, modification, deletion
- Policy Changes: Security policy updates
- System Configuration: System setting changes
- Certificate Operations: Certificate generation, revocation
Security Events#
- Failed Authentications: Invalid login attempts
- Permission Denials: Unauthorized access attempts
- Session Events: Session creation, expiration, revocation
- Agent Events: Agent registration, key rotation
Audit Log Structure#
{
"id": 12345,
"user_id": 1,
"action": "login",
"resource": "user",
"resource_id": 1,
"details": {
"os": "macOS 14.0",
"ip_address": "192.0.2.1"
},
"ip_address": "192.0.2.1",
"hostname": "workstation.example.com",
"user_agent": "Mozilla/5.0...",
"created_at": "2025-01-15T10:30:00Z"
}Log Storage#
- Database: Audit logs stored in PostgreSQL
- Retention: Configurable retention policies
- Search: Full-text search capabilities
- Export: CSV and PDF export for compliance reports
Compliance Features#
Complete Audit Trail#
- All Operations: Every operation logged with timestamp
- User Attribution: All actions attributed to specific users
- Resource Tracking: Resources accessed tracked
- IP Address Logging: Source IP addresses logged
- User Agent Logging: Browser/client information logged
Reporting Capabilities#
Device Inventory Report#
- Complete list of all registered YubiKeys
- Device details (serial, owner, status)
- Certificate status
- Registration dates
Certificate Status Report#
- All certificates across all devices
- Expiration dates
- Revocation status
- Certificate details
User Activity Report#
- User authentication events
- Device operations
- Time periods
- Filtered by user or date range
Security Events Report#
- Failed authentication attempts
- Permission denials
- Suspicious activity
- Policy violations
Data Retention#
- Configurable Retention: Set retention periods per log type
- Automatic Cleanup: Expired logs automatically archived
- Archive Support: Export logs before cleanup
- Compliance Periods: Support for regulatory retention requirements
Security Compliance#
Access Control#
- RBAC: Role-based access control
- Least Privilege: Users have minimum required permissions
- Session Management: Secure session handling
- Token Security: Secure token generation and validation
Data Protection#
- Encryption at Rest: Vault encryption for secrets
- Encryption in Transit: HTTPS/TLS for all communication
- Password Security: Argon2id hashing for passwords
- Secret Management: Vault-first secret storage
Audit Requirements#
Who#
- User ID and username
- IP address
- User agent
What#
- Action performed
- Resource accessed
- Operation details
When#
- Timestamp (UTC)
- Date and time
- Timezone information
Where#
- IP address
- Hostname
- Geographic location (if available)
Regulatory Compliance#
GDPR Considerations#
- Data Minimization: Only necessary data collected
- Right to Access: Users can view their data
- Right to Deletion: Users can request data deletion
- Data Portability: Export capabilities for user data
- Audit Trail: Complete logging for compliance
SOC 2 Considerations#
- Access Controls: RBAC and authentication
- Audit Logging: Complete audit trail
- Change Management: All changes logged
- Incident Response: Security event logging
- Monitoring: System health and security monitoring
HIPAA Considerations (if applicable)#
- Access Controls: User authentication and authorization
- Audit Logging: Complete audit trail
- Encryption: Data encryption at rest and in transit
- User Management: User account lifecycle management
Compliance Reporting#
Report Generation#
Reports are available in PDF format and can be downloaded from the admin user interface:
- PDF: Formatted reports for compliance documentation
- Download: Available in admin panel under Reports section
- Manual Generation: Reports generated on demand by administrators
Best Practices#
For Compliance Officers#
- ✅ Review audit logs regularly
- ✅ Generate compliance reports monthly
- ✅ Monitor security events
- ✅ Review user access patterns
- ✅ Verify data retention policies
- ✅ Test audit log integrity
For Administrators#
- ✅ Enable all audit logging
- ✅ Configure appropriate retention periods
- ✅ Monitor failed authentication attempts
- ✅ Review administrative actions
- ✅ Export logs before cleanup
- ✅ Secure audit log storage
Audit Log Access#
Viewing Audit Logs#
- Web Interface: Admin dashboard for audit log viewing
- API Access: REST API for programmatic access
- Export: CSV/PDF export for compliance documentation
Audit Log Security#
- Access Control: Only admins can view audit logs
- Immutable Logs: Audit logs cannot be modified
- Secure Storage: Audit logs stored securely in database
- Backup: Audit logs included in database backups