What to Log
Log: user identity, timestamp, model used, prompt type (not content for privacy), response metadata, policy violations detected, and actions taken (allowed, blocked, redacted). Never log raw prompt content in high-sensitivity environments.
Storage and Retention
Store audit logs separately from application data. Use immutable storage (WORM) for compliance. Retain logs per regulatory requirements: HIPAA (6 years), SOX (7 years), GDPR (varies). Encrypt at rest.
Forensic Value
Audit trails enable incident investigation: trace data exposure paths, identify policy violation patterns, reconstruct event timelines, and provide evidence for regulatory inquiries.
Operational Insights
Beyond compliance, audit data reveals: model adoption patterns, common use cases, productivity trends, cost optimization opportunities, and training needs by department.
.png)