Audit Log
Overview
Every action in ID Wispera is logged. The audit log provides complete visibility into credential usage across creation, access, modification, revocation, sharing, and delegation events.What Gets Logged
Each audit entry captures:| Field | Description |
|---|---|
| Actor | Who performed the action (user, MCP agent, delegate) |
| Timestamp | When it occurred, with timezone |
| Platform | Which platform or integration triggered the action |
| Purpose | The stated reason for the access |
| Action type | One of: creation, access, modification, revocation, sharing, delegation |
Viewing the Audit Log
Use the CLI to view the full audit trail:MCP Audit Trail
Every credential access through the MCP integration is logged automatically:MCP audit entries include the
purpose field provided by the AI agent, giving you full context for why a credential was accessed.Audit Log Integrity
The audit log is designed to be tamper-resistant:- Append-only — Entries cannot be modified or deleted.
- Encrypted with the vault — The log is protected by the same AES-256-GCM encryption as your credentials, making it tamper-evident.
- Delegation chain tracking — Full delegation chain events are recorded, so you can trace access back through every link.
Export Formats
The audit log supports export for integration with external compliance and monitoring tools:Compliance Considerations
Audit Requirements
ID Wispera’s audit log satisfies common compliance requirements:- Complete access history for every credential
- Actor identification on every event
- Timestamps with timezone for accurate chronology
- Platform and purpose tracking for access justification
- Export to CSV and JSON for external review
Data Residency
- Credentials are stored locally on your machine
- No cloud sync is required
- Optional self-hosted sync for team environments
- Audit logs stay local alongside the vault
Because all data remains local by default, ID Wispera can help satisfy data residency requirements without additional configuration.
Access Control
The policy engine supports fine-grained access control:- Role-based restrictions via tags
- Time-based access windows
- Approval workflows for sensitive credentials
- Delegation limits to control credential sharing depth
Incident Response
Credential Exposure
If a credential has been exposed:- Immediately revoke the passport:
- Review the audit log to understand the scope of exposure:
- Rotate the credential at the source provider.
- Create a new passport with the fresh credential.
Vault Compromise
If you suspect the vault file or passphrase has been compromised:- Generate new credentials at all source providers.
- Create a new vault with
idw init. - Import the fresh credentials into the new vault.
- Securely delete the old vault file.
Suspicious Activity
If you notice anomalous patterns in the audit log:- Review the audit log for unauthorized access entries.
- Check for unusual access patterns (unexpected times, unknown actors).
- Verify delegation chains for unauthorized delegates.
- Revoke any suspicious passports immediately.
- Notify affected parties if credentials may have been misused.