Audit Log Overview
Rubric maintains detailed audit logs for every action involving protected health information (PHI). These logs are immutable, tamper-evident, and retained for 7 years to meet HIPAA requirements.Complete Visibility
Every PHI access, modification, and export is logged with full context.
Immutable Records
Cryptographically signed logs that cannot be altered or deleted.
7-Year Retention
Automatic retention meeting HIPAA’s 6-year requirement plus buffer.
Real-Time Alerts
Instant notifications for suspicious access patterns and anomalies.
What Gets Logged
Rubric captures comprehensive audit events across all system interactions. Each log entry includes who, what, when, where, and the outcome of each action.Event Categories
| Category | Events | Examples |
|---|---|---|
| Authentication | Login, logout, MFA, session events | User login, failed MFA attempt, session timeout |
| PHI Access | View, search, download PHI records | Viewed transcript, searched patient records |
| Data Modification | Create, update, delete operations | Added annotation, updated evaluation score |
| Export & Share | Data exports, report generation | Exported dataset, generated compliance report |
| Administrative | User management, settings changes | Added team member, modified project settings |
| API Access | All API calls with full request/response | SDK upload, evaluation creation |
| System Events | Automated processes, scheduled jobs | Backup completed, key rotation executed |
Log Entry Structure
audit_log_entry.json
Querying Audit Logs
Access audit logs through the API or dashboard with powerful filtering and search capabilities.Basic Log Queries
query_logs.py
Search by Patient
patient_access_report.py
Configuring Alerts
configure_alerts.py
Anomaly Detection
Machine learning-powered anomaly detection identifies unusual access patterns that may indicate compromised accounts or insider threats.Anomaly Types Detected
| Anomaly Type | Description | Indicators |
|---|---|---|
| Unusual Access Time | Access outside normal working hours | Time of day, day of week patterns |
| High Volume Access | Accessing more records than typical | Record count per hour/day |
| Geographic Anomaly | Access from unusual location | IP geolocation, travel speed |
| New Resource Types | Accessing unfamiliar data types | First-time resource access |
| Bulk Export | Large data exports | Export size, frequency |
| Pattern Change | Sudden change in access patterns | Multiple behavioral deviations |
Log Retention & Archival
| Log Type | Hot Storage | Warm Storage | Cold Storage | Total Retention |
|---|---|---|---|---|
| PHI Access Logs | 90 days | 1 year | 6 years | 7 years |
| Authentication Logs | 90 days | 1 year | 6 years | 7 years |
| Administrative Logs | 90 days | 1 year | 6 years | 7 years |
| API Access Logs | 30 days | 1 year | 2 years | 3 years |
| System Events | 30 days | 6 months | 1 year | 18 months |
Immutable Logs: All audit logs are cryptographically signed and stored in append-only storage. Logs cannot be modified or deleted, even by administrators, ensuring a complete and trustworthy audit trail.
Best Practices
| Practice | Description |
|---|---|
| Configure Critical Alerts | Set up alerts for failed logins, bulk exports, and break-glass access. |
| Regular Access Reviews | Conduct quarterly access reviews to identify and revoke unnecessary access. |
| Export to SIEM | Integrate with your SIEM for centralized security monitoring. |
| Enable Anomaly Detection | Use ML-powered anomaly detection to catch subtle security threats. |
| Document Access Reasons | Require users to document reasons for accessing sensitive records. |
| Test Alerting | Regularly test that alerts are working and reaching the right people. |
