Announcing Program Audit Log

November 14, 2019 johnk

As our customers’ security teams grow, it’s important for us to sustain their growth with new features. Today we’re announcing the Program Audit Log. It enables customers to audit important actions that were taken in their program, such as permission updates, new members, bounty rewards, and program settings.

Programs can use the audit log to:
    •    Investigate program changes during an incident, such as a rogue employee

    •    Monitor when sensitive permissions are added, and by whom

    •    Proactively set up alerts for suspicious actions, such as an employee moving back and forth between two countries in a day or awarding a larger than an expected bounty


The audit log will be available for every program on the platform. It comes with advanced features that enable customers to feed Program Audit Log events into their internal log aggregation platform for alerting.

 

Program Audit 1

 

The Program Audit Log can be found under program settings. Customers can easily filter by specific events, users, and event time.

Many of our customers manage their program with HackerOne’s customer success team. We’ve made it easy to distinguish between actions that were taken by HackerOne employees and internal colleagues. For each action taken by a team member, we log the country and browser user agent, which can be used for additional alerts.

Program Audit 2

 

Some of our customers will want to feed the Program Audit Log into their own log aggregation platform. We have a solution for that:  a CSV export and API support.

HackerOne is excited to continue to build features that improve our customers’ ability to manage their programs. And we look forward to seeing all the different ways our customers use the Program Audit Log! As always, we’ll be listening to your reactions and requests at feedback@hackerone.com.

Previous Article
Supporting the Source: Why HackerOne is Upgrading its Free Tools for Open Source
Supporting the Source: Why HackerOne is Upgrading its Free Tools for Open Source

Protecting open source is our social responsibility and essential to internet well being. We believe this i...

Next Article
Reducing Risk With a Bug Product: Bounty Program
Reducing Risk With a Bug Product: Bounty Program

Data breaches can cost millions in damages and fines and have a devastating impact on customer trust, reput...