Audit trail
Every action taken in CauseFlow — by users, AI agents, or automated processes — is recorded in an immutable audit log.Coverage
CauseFlow tracks 67 action types across 8 categories:| Category | Examples |
|---|---|
tenant.* | Tenant created, configuration changed |
incident.* | Incident created, severity updated, status changed |
investigation.* | Investigation started, agent dispatched, findings submitted |
remediation.* | Remediation proposed, approved, rejected, executed |
credential.* | STS credentials issued, revoked |
auth.* | User signed in, token issued, API key created or revoked |
github.* | GitHub installation connected, PR created |
notification.* | Alert sent, approval request delivered |
Tamper-proof hash chain
Each audit record includes a SHA-256 hash that chains to the previous record. Modifying any record — even retroactively — breaks the chain and is immediately detectable.Exporting the audit trail
Export your audit trail for SIEM integration or compliance reporting:- Go to Dashboard > Audit.
- Click Export.
- Select a date range and click Download.
SOC 2 readiness
CauseFlow implements controls aligned with SOC 2 Trust Services Criteria across all five categories.| Trust Services Criteria | Controls in place |
|---|---|
| Security | RBAC, JWT authentication, API key management, rate limiting, input validation, CORS restrictions |
| Availability | Health endpoints, multi-region infrastructure, rate limiting to prevent abuse |
| Processing Integrity | Zod input validation at all boundaries, immutable audit trail, HMAC webhook verification |
| Confidentiality | KMS envelope encryption, tenant data isolation, temporary credentials, TLS in transit |
| Privacy | PII masking via Relay, right to deletion, data processing agreements, minimum-permission agents |
GDPR and LGPD
CauseFlow’s architecture is designed around data minimization and purpose limitation — the same principles underpinning GDPR and LGPD.| Requirement | How CauseFlow addresses it |
|---|---|
| Data minimization | AI agents access only the data needed for the specific investigation task |
| Purpose limitation | Credentials are scoped to investigation tasks and revoked immediately after |
| Right of access | All investigation data is accessible via the dashboard and API |
| Right to erasure | Full tenant data deletion available on request (30-day SLA) |
| Data processing agreements | Available on request |
| PII protection | Relay masking prevents raw PII from leaving your infrastructure |
Responsible disclosure
CauseFlow takes security vulnerabilities seriously. If you discover a security issue, please report it responsibly. How to report:- Email security@causeflow.ai with a description of the vulnerability.
- Include steps to reproduce, the potential impact, and any supporting evidence (screenshots, logs, proof-of-concept code).
- Do not publicly disclose the issue until CauseFlow has had reasonable time to investigate and remediate.
- Acknowledgement within 2 business days
- Status updates every 5 business days during investigation
- Credit in our security acknowledgements (if desired) upon resolution
For non-security support issues, contact support@causeflow.ai or use the in-dashboard help widget.