Policy and Key Audit logs

It shows how policy and key audit logs are tracked.

The policy audit logs generated for policy-related operations are sent to ESA. You can view them in Discover. Log in to the ESA, navigating to Audit Store > Dashboard > Open in new tab. Select Discover from the menu and select a time period such as Last 30 days.

Note:

  • The policy and key audit log codes are similar to the previous version.
  • The log descriptions in v10.2.0 are revised for policy and key audits. These changes may impact automated systems, alerts, and parsing logic in production environments. We recommend to review and update any dependent tools or queries.

event_status Field

In the ESA v10.2.0, a new field event_status has been introduced for all policy and key related audits. This field captures the outcome of each policy operation:

  • Success: Indicates the action was completed successfully.

  • Failure: Indicates the action was unsuccessful due to an error.

  • Other: Indicates the event_status cannot be classified as neither a success nor a failure. The other value is usually used for logs providing information about an operation performed.

Example: Master Key Rotation – Success and Failure

Success Scenario

Imagine you are performing a routine rotation of the Master Key to maintain cryptographic hygiene. The following logs would indicate a successful operation:

Log CodeLog DescriptionEvent StatusWhat It Means
179Rotate master key. (Master key rotated successfully)successThe Master Key was rotated without issues.
78Create key. (Key xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx created)successA new key was generated as part of the rotation process.

These logs confirm that the key lifecycle was handled properly. For instance, a new key was created, the old one was deactivated, and the system remains secure and compliant.

Failure Scenario

Now, suppose the Master Key rotation fails due to a service outage, for example the kmgw service has stopped. You might see logs like:

Log CodeLog DescriptionEvent StatusWhat It Means
179Rotate master key. (Master key rotation failed)failureThe rotation process could not complete due to a system issue.
78Create key.failureThe system failed to generate a new key, possibly because the key management gateway kmgw was down.

These logs indicate that the rotation process was interrupted. No new key was created and the old key remains active. This could pose a security risk if not resolved promptly.

Other Scenario

Log CodeLog DescriptionEvent StatusWhat It Means
178Master key expire warning. (Master key with UID: xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx will expire on yyyy-mm-dd)otherMaster key expire warning.

Table: Policy and Key Audit logs

Audit CodeLog Description
50Create policy.
51Update policy.
52Delete policy.
56Role added to policy.
57Unprotect access revoked for users having mask conflict.
58Data element added to policy.
59Data element removed from policy.
71Deploy policy.
74Policy removed from datastore.
75Policy added to datastore.
76Policy changed state.
78Create key.
80Policy deploy failed.
81Policy deploy started.
82Policy deploy ended.
83Token publish failed.
84Token published successful.
85Data Element key(s) exported.
86Policy deploy warning.
87Alphabet publish failed.
88Alphabet published successful.
100Password changed.
101Create datastore.
102Update datastore.
103Delete datastore.
107Create mask.
108Delete mask.
109Securitycoordinate deleted.
110Securitycoordinate created.
111Create role.
112Delete role.
113Create membersource.
114Update membersource.
115Delete membersource.
116All roles resolved.
117Role resolved.
118Role groupmember resolved.
119Create trusted application.
120Delete trusted application.
121Update trusted application.
124Trusted application added to datastore.
125Trusted application removed from datastore.
126Update mask.
127Update role.
128Policy permissions updated.
129Node registered.
130Node updated.
131Node unregistered.
141Create alphabet.
142Delete Alphabet.
149Update data element.
150Create data element.
151Delete data element.
152Too many keys created.
153License expire warning.
154License has expired.
155License is invalid.
156Policy is compromised.
157Failed to import some users.
158Policy successfully imported.
159Failed to import policy.
170Key exported.
171Key updated.
172Key deleted.
173Datastore key has expired.
174Datastore key expire warning.
176Rotate datastore key.
177Master key has expired.
178Master key expire warning.
179Rotate master key.
180Configure New HSM.
181Repository key has expired.
182Repository key expire warning.
183Rotate repository key.
184Metering created.
185Metering updated.
186Metering deleted.
187Integrity created.
188Integrity updated.
189Integrity deleted.
195Signing key has expired.
196Signing key expire warning.
197Rotate signing key.
198Signing key exported.
199Case sensitive data element created.
210Data Element key has expired.
211Data Element key expire warning.
212Conflicting policy users found.
213Change key state.
214Automatic key rotation disabled.
215Automatic key rotation enabled.
220Data Element deprecated.
221Add export key.
222Update export key.
223Delete export key.
224Role permissions updated for Data Element.
225Permissions for Data Element updated.
226Role removed from policy.
227Create range in datastore.
228Update range in datastore.
229Delete range from datastore.
230Add member to role.
231Update member in role.
232Remove member from role.



To view the policy audit logs:

  1. Log in to the ESA.
  2. Navigate to Audit Store > Dashboard.
  3. From the menu, select Discover.
  4. Select index pty_insight_analytics*policy_log_* from Index patterns and a time period such as Today.
    The list of policy audit logs appear.
    For more information about the Insight Indexes, refer to Understanding the Insight indexes.

Last modified : February 02, 2026