Sysdig Platform Audit

Sysdig provides both a UI and a set of APIs for auditing and reporting on the use of the Sysdig platform itself.

This is in contrast to the Activity Audit or Kubernetes Audit Log features which audit the activities on your target environments.

With Platform Audit, you can answer questions such as:

  • Who deleted a policy?
  • From where was a policy modified?
  • Which modifications were made to a specific alert?
  • Who added this user?
  • When did we change the single sign-on (SSO) settings?

The audit includes the following request methods against the Sysdig system:

  • PUT
  • POST
  • DELETE
  • PATCH
  • GET

Sysdig retains system audit data for 90 days. To retain Sysdig Secure platform audit data for longer, you can use Event Forwarding, to forward platform audit events to third-party tools, such as Mezmo. See Event Forwarding. You cannot forward Sysdig Monitor system audit data.

Use the Platform Audit UI

Access the UI

To access the Platform Audit in Sysdig Secure or Sysdig Monitor UI:

  1. Log in as an administrator.
  2. From the left navigation bar, select Integrations > Data Sources | Sysdig Platform Audit.

Use the UI

Platform Audit lets you understand what was done on the Sysdig platform, when, and by whom.

You can create custom filters by typing in the filter box, or by choosing from the selection of operators shown in the UI.

Data can be filtered based on:

  • User
  • Team
  • Request Method
  • Entity Type
  • Origin IP

By default, the Platform Audit UI page filters out READ statements through the filter requestMethod != GET. This is based on the assumption that you might be primarily interested in changes made on the platform with commands such as PUT, POST, DELETE, and PATCH. To view READ actions, click X to delete the requestMethod != GET filter.

The date range is given to the right of the filter bar. Select the dates to open up a calendar, where you can define a custom range. The date range can be a maximum of 14 days.

Use the Platform Audit API

Prerequisites

Ensure you have the following information to hand:

  • Your Sysdig Secure or Sysdig Monitor API token
  • The correct URL for the region where your Sysdig SaaS platform is deployed. For example, https://app.sysdigcloud.com for AWS US-East. To find the correct URL for your region, see SaaS Regions and IP Ranges.
  • The code of the Sysdig product you want to audit. Secure = SDS. Monitor = SDC.

Commands Overview

CommandDescription
filter=source in ("auditTrail")Informs the events feed API that you want to fetch auditTrail type of events.
{{host}}Host of the region for which you want to fetch audit events. For example, https://app.sysdigcloud.com for AWS US-East.
{{from}}(nanoseconds) Timestamp date range, for example, from=1648477226000000000&to=164934122600000000
{{to}}(nanoseconds) Timestamp date range, for example, from=1648477226000000000&to=164934122600000000
{{limit}}(integer) - The upper bound is 999. Defines how many events you will receive, and is used in combination with offset. For example, offset=100&limit=100 (skip first 100 and show next 100).
{{offset}}(integer) Used when we implement paging; allows you to skip the first x events. For example, offset=100 will skip the first 100 events.
{{token}}(string) - Sysdig Secure or Sysdig Monitor API token.

API Usage

Get All Audit Events Across the Product and Services

For Sysdig Secure

GET {{host}}/api/v1/platformAuditEvents?from={{from}}&to={{to}}&limit={{limit}}
X-Sysdig-Product: SDS
Authorization: Bearer {{token}}

For Sysdig Monitor

GET {{host}}/api/v1/platformAuditEvents?from={{from}}&to={{to}}&limit={{limit}}
X-Sysdig-Product: SDC
Authorization: Bearer {{token}}

Get Audit Events for a Specific Entity

auditTrail.entityType is used if you want to list audit events only for a specific entity or list of entities. In this example, we want to fetch only auth audit events.

X-Sysdig-Product:= SDS (Sysdig Secure) SDC (Sysdig Monitor)

GET {{host}}/api/v1/platformAuditEvents?filter=auditTrail.entityType in ("auth")&from={{from}}&to={{to}}&limit={{limit}}
X-Sysdig-Product: SDS
Authorization: Bearer {{token}}

Entities

Sysdig Admin Endpoints

EntityUsed for
billing_reportSubscription billing report.
customerCustomers management.
customer_metricsCustomers metrics management.
customer_signupCustomer signup process.
ondemand_usageCalculating on demand usage.
trial_planTrial plans management.
usage_summaryUsage summary.

Sysdig Monitor and Sysdig Platform

Some entities are also used in Sysdig Secure but are served by Sysdig Monitor

EntityUsed for
agentAgent operations.
alertAlert management.
alert_notification(Legacy) Alert notifications.
alert_silencing_ruleAlert Silencing Rules Management.
alert_template_groupListing alert template groups.
api_tokenUser Profile to read and reset API token.
application_user_settingsFetching some user app settings like firstTimeOnApp, userTrackingEnabled, and so on.
authLogin/logout events.
auth_settingsAuthentication settings.
auth_ssoSSO authentication events.
aws_settingsAWS settings to enable/disable CloudWatch Integration.
benchmarkBenchmark tests and results management.
captureCapture management.
cloud_subscriptionCloud subscription management.
customer_access_keyAccess keys management. API only.
customer_agreementAgreements that customer can sign, for example, end-user license agreements (EULA).
customer_settingsUser Profile to hide Access Key and Agent Installation page for non-admin users.
dashboardDashboard management.
dashboard_templateFetching dashboard templates.
datasourceListing metric data sources.
datastreamConfiguring datastream.
default_dashboardFetching default dashboards.
downtimeNotification channel settings to temporarily disable alert events and mute all notifications.
eventEvents management
falco_listCreate, read, update and delete (CRUD) operations related to lists (In the UI: Policies->Falco Lists).
falco_macroCRUD operations related to macros (In the UI: Policies->Falco Macros).
falco_rules_fileCRUD operations for Falco-related files like default and custom rules files that create macros, lists and rules using yaml (on UI: Policies->Rules Editor).
file_storage_configFile storage management.
group_mappingMapping identity provider (IdP) groups to Sysdig teams and roles.
ibm_resourceFetching IBM resource instances.
inactivity_settingsSession expiration settings.
integrationIntegrations.
invoiceListing invoices.
licenseUsed to fetch on-prem licenses.
login_bannerThe agreement that must be accepted before logging in.
notification_channelNotification channel settings.
offerListing offers.
onboardingFetching onboarding data and updating steps.
overviewFetching overviews.
permissionPermissions management.
plan_settingsFetching plan settings.
policySecure policies management.
policy_actionGetting a list of actions corresponding to a policy type when you try to create/edit a policy (in the UI: Policies->Runtime Policies->Add or Edit existing policy).
policy_descriptorDefining the scope in which to apply a policy type when creating/editing a policy CRUD operations related to lists (in the UI: Policies->Runtime Policies->Add or Edit existing policy).
prometheus_ruleUsed to export alerts and alert notifications in a Prometheus API format. Also allows users to create/export Prometheus alerting/recording rules.
providerUsed in AWS settings for AWS Accounts management.
restricted_tokenIBM restricted API token management
roleRole management.
runtime_policy_ruleCRUD operations related to runtime policy rules (on UI: Policies->Rules Library).
s3_settingsSysdig Storage settings.
scanning_eventScanning events operations.
secure_settingsSecure settings management.
service_accountService account management
silencing_ruleSilencing Rules Management.
slackSlack integration setup.
statementListing statements.
subscriptionManafinf subscription.
teamTeams management.
ui_user_settingsFetching some UI user settings.
usage_reportListing usage reports.
userUsers Management and in User Profile to reset passwords.

Sysdig Secure

EntityUsed for
acceptance-editPost, put and delete operations in Vulnerability Management (VM) in Risk Acceptance.
acceptance-readGet operations in VM Risk Acceptance.
acceptance-read-scannerGet operations in VM Risk Acceptance.
account
blackout
clusterUsed in VM Legacy for CREATE, READ, UPDATE and DELETE operations on clusters and heartbeat.
compliancethe Legacy Compliance module.
csv
customerOptOut
dataSource
downloadDownloading VM Reports.
eventViewing an event.
falcoViewing or modifying a Falco rule.
feature
forwarding_integration
framework
group
health
host
internal
kubernetesNetworking
labels
listReferring to a list of items in Falco Rules.
macroEncapsulating small expressions for use in Falco Rules.
networkSecurityViewing or changing Network Security configurations and see how a KNP policy is generated.
networkTopologyViewing the Network Security Topology.
overview
policyCreate, read, update and delete (CRUD) operations related to runtime policies.
policyTunerViewing or editing exceptions.
provider
readerVM Reporting, as well as SNOW and EVE integrations.
remediations
report
resource
ruleUsed to view a Falco rule through the rules library, a runtime policy, or an event.
schema
secure-iac-acproviderCSPM. Not related to a user action.
secure-iac-agenthandlerPosture. Not related to a user action.
secure-iac-cloudcollectorCSPM. Not related to a user action.
secure-iac-cloudenginePosture for reading cloud assets posture, creating cloud asset report, and reading remediation playbook.
secure-iac-clusteranalysisPosture for reading host assets posture, creating host asset report, and reading remediation playbook.
secure-iac-compliancePosture and Compliance for reading compliance results, creating compliance report, accepting posture risks, editing \ revoking \ reading posture risks, and adding compliance views to favorites.
secure-iac-gitproviderreading git integration, creating git integration, and git source.
secure-iac-inventoryInventory to read assets/resources details, compliance posture status, list resources, their connections, attributes and configuration.
secure-iac-policyPosture, Compliance and Zones to read policies, controls, CRUD custom policies, CRUD custom controls, CRUD ACEnforcement, CRUD Zones.
secure-iac-schedulerKSPM and CSPM scan tasks: read tasks, re-run task, re-schedule task.
secure-iac-temporalworkerCSPM. Not related to a user action.
secure-iac-workloadReading Kubernetes assets posture, create Kubernetes asset report, read Kubernetes remediation playbook.
session
task
ticketing
user
vm-collector-writeCLI or other component sending a scan result to the collector.
vm-policies-readInternal API to read VM policies.
vm-policies-writeInternal API to write VM policies.
vm-riskacceptance-read-scannerGET operations in Accepted Risk.
vm-riskacceptance-read-uiGET operations in Accepted Risk.
vm-riskacceptance-write-uiPOST, PUT and DELETE operations in Accepted Risk.
writerVM Reporting configuration and EVE Integration data reception.

The Infrastructure as Code (IAC) Entities

This list contains Infrastructure as Code (IAC) entities in Sysdig Secure:

EntityDescription
secure-iac-cloudengineUsed to read cloud assets posture, create cloud asset reports, and read remediation playbook.
secure-iac-clusteranalysisUsed to read hosts assets posture, create a host asset report, and read the remediation playbook.
secure-iac-complianceUsed to read compliance results, create compliance report, accept posture risks, edit, revoke, and read posture risks, as well as star favorite compliance views.
secure-iac-gitproviderUsed to read Git integration, create a Git integration, and Git source.
secure-iac-inventoryUsed to read assets, resources details, compliance posture status, lists resources, their connections, attributes and configuration.
secure-iac-policyUsed to read policies, controls, create, read, update and delete (CRUD) operations on custom policies, CRUD operations on custom controls, CRUD operations on ACEnforcement, and CRUD operations on Zones.
secure-iac-schedulerKubernetes Security Posture Management (KSPM) and Cloud Security Posture Management (CSPM) scan tasks, such as read tasks, re-run tasks, and re-schedule tasks.
secure-iac-workloadUsed to read Kubernetes assets posture, create Kubernetes asset report, and read Kubernetes remediation playbook.