Security monitoring
In order to track changes to our cloud servers, the following actions are logged:
- SSH authentications
- User commands
- Changing user privileges
- Sign-in attempts
- Other indicators specific to our internal platform