Change Log
Creation and change of personal data need to be documented. Therefore, for review purposes or as a result of legal regulations, it may be necessary to track the changes made to this data. When these changes are logged, you should be able to check which user made which change, the date and time, the previous value, and the current value, depending on the configuration. Furthermore, log records can be viewed and queried, but access to them is restricted by adequate authorizations. The personal data for which changes shall be logged and the retention period of logs, can be configured..
-
Logs changes to personal data
-
Logs are stored in asset core DB. The log stores the following information:
- User who is changing the data
- the date and time of change
- the data sets' identifying keys and their values
- the heading name for the attribute that has been changed
- the user whose data is changed
-
SAP Asset Intelligence Network logs cover the following requirements:
-
Access to the log records is restricted by adequate authorizations.
-
Log records are protected against modification by persons whose activities are subject to be documented by the log records.
-
Secrets like passwords, crypto keys and security tokens are never logged.
-
It is possible to destroy the log records using a retention framework.
-
Retention policies are configurable per tenant. Furthermore, logs are recorded and made accessible per tenant.
-
Logs of contact persons and users belonging to my organization, my invitees, my subsidiaries, my invitees' subsidiaries are displayed.
-
Logs of blocked persons (soft deleted users), persons of deleted objects (functional locations, inactive organizations, equipment) are not displayed.
-
-
Basic functionality is in place to view and query the log records in a user-friendly way.