PPromptHelm Docs
Concepts

Audit Log: Compliance & Forensics

Every privileged action is recorded for compliance, debugging, and incident response.

PromptHelm records every privileged action as an append-only audit event. The audit log is what makes a SOC 2 review tractable, what lets you reconstruct a security incident, and what gives engineering managers a single source of truth for "who changed what, when, and why."

What gets recorded

Every action that mutates organization state, security posture, or billing creates an audit entry:

  • Organization — create, rename, delete, transfer ownership.
  • Members — invite, remove, role change.
  • Prompts — create, version save, promotion, archive.
  • Provider keys — add, rotate, revoke.
  • API tokens — mint, revoke.
  • Authentication — password change, passkey enroll/remove, OAuth link/unlink, login from new device.
  • Account — deletion, GDPR export, tier change.
  • Webhooks — install, rotate signing secret, remove.

Read-only actions (viewing a prompt, running the playground, listing analytics) are not recorded — that traffic lives in execution logs and RUM, not the audit trail.

What each entry contains

NameTypeDefaultDescription
actorIdObjectIdThe user or service that performed the action.
actorTypeuser | api_token | systemDistinguishes manual changes from automation.
action*stringStable verb, e.g. prompt.promote, member.role.change.
resource{ type, id }What the action targeted.
metadataobjectAction-specific context: previous value, new value, IP, user-agent.
createdAt*DateServer timestamp; never editable.

Tier visibility

NameTypeDefaultDescription
FreetierAudit events are recorded but not surfaced in the dashboard.
ProtierLast 7 days visible in /settings/audit.
BusinesstierLast 90 days visible, filterable by actor and action.
EnterprisetierFull retention plus signed CSV/JSON export.

Compliance posture

GDPR exports + audit retention are the building blocks for SOC 2 and HIPAA readiness. The combination answers the two questions auditors ask first:

  1. Can you produce a record of every privileged change? — yes, indefinitely (Enterprise) or for the tier window.
  2. Can you prove records have not been tampered with? — yes, entries are append-only and the audit collection has no update or delete privileges in the application role.

Append-only means append-only

Audit records are never mutated and never deleted. Even an account deletion creates a final account.delete entry rather than wiping the trail.

Where to find it

The dashboard surface is /settings/audit (Pro tier and above). The backend module is live across all tiers; the UI rolls out by tier as described above.

Next steps

On this page