Every action that touches PHI in your practice is recorded. As a practice admin you can view, filter, and export the audit log — for routine oversight, incident investigation, or HIPAA audit response.
The audit log view
Settings → Security → Audit logs. Requires theadmin role.
Each row shows:
| Column | What it means |
|---|---|
| Timestamp | UTC, millisecond precision |
| Actor | User ID, role at time of action, auth method |
| Event type | access, create, update, delete, export, disclosure, auth, settings |
| Resource | Model + ID (e.g. OverturnableDenial#1234) — not the PHI content |
| Action | HTTP method + route or service call |
| Result | Success / failure / denied |
| IP + UA | For troubleshooting and incident investigation |
| Request ID | Correlates with application logs |
Filters
- By actor (user, role)
- By event type
- By resource type
- By date range
- By result (show only failures / only denied)
- By IP
What’s captured
Every PHI read
Every PHI read
Opening a denial, viewing a document, listing patients — all audit-logged.
Every PHI write
Every PHI write
Creating, updating, or deleting a PHI-bearing record.
Every export
Every export
Data exports — CSV, XLSX, JSON, PDF. The exported content isn’t logged, but the fact of the export and the scope are.
Every authentication event
Every authentication event
Sign-in success, sign-in failure, 2FA enroll/use/reset, passkey register/delete, account lockout, session termination.
Every admin action
Every admin action
Role changes, user invites, user removals, settings changes, bulk operations, audit log access itself.
Every failed authorization
Every failed authorization
What’s NOT captured
- The actual content of PHI being accessed — audit entries are metadata.
- API response bodies — to keep the audit log from becoming a second copy of your data.
Retention
- 7 years — exceeds the HIPAA minimum of 6 years.
- Stored in Cloud Logging with an independent immutable archive.
- Cleanup is automated for entries older than 7 years; before that, no admin (including Denialbase internal) can delete entries.
Export
Using the audit log for investigations
If you suspect improper access:- Filter by the suspect user and date range.
- Look for patterns: off-hours access, unusually broad queries, bulk exports.
- Export the filtered slice for formal review.
- Suspend the account if warranted — see Team management.
- If you believe a breach may have occurred, notify security@denialbase.com — we can help with the incident response.
Integrating with your SIEM
- Cloud Logging sink — enterprise customers can have audit events streamed to their own GCP project via a Cloud Logging sink. Contact support.
- Webhook — per-event webhook (Q3 2026).