Security monitoring

In order to track changes to our cloud servers, the following actions are logged:

  • SSH authentications
  • User commands
  • Changing user privileges
  • Sign-in attempts
  • Other indicators specific to our internal platform