Logging System¶
Three distinct logging systems are provided within the Escape platform, each designed to serve specific monitoring and compliance requirements: Audit Logs for platform-wide user actions, Activity Logs for resource-specific changes, and Scan Logs for detailed execution traces.
Audit Logs¶
Overview¶
Audit Logs are provided as an Enterprise feature to maintain comprehensive records of all user actions performed within the Escape platform. These logs are essential for security compliance, accountability, and forensic analysis at the organizational level.
Audit Logs are accessed through the Organization section of the platform.
Tracked Events¶
The following categories of user actions are logged:
Authentication Events
- User login and logout activities
- Session creation and termination
- Authentication method changes
- Multi-factor authentication events
Platform Configuration Changes
- Application Profile modifications
- Security policy updates
- Integration configurations
- Organization settings adjustments
- User role and permission assignments
Resource Management
- Project creation and deletion
- Application Profile management
- Scan Profile configurations
- Private Location deployments
Access Control Events
- Permission grants and revocations
- Role assignments and modifications
- API key generation and rotation
- Team membership changes
Log Structure¶
Each Audit Log entry contains the following information:
- Timestamp: The exact date and time when the action was performed
- User: The authenticated user who performed the action
- Action Type: The category and specific action executed
- Resource: The target resource affected by the action
- Outcome: Success or failure status of the action
- IP Address: The source IP address of the request
- User Agent: The client application or browser used
Example entry:
[2024-11-10 14:32:18 UTC] User 'alice@example.com' updated Application Profile 'Production API' (ID: app_abc123). Source IP: 203.0.113.42. Status: SUCCESS
Search and Filtering¶
Audit Logs can be filtered and searched using multiple criteria:
- Date Range: Events within a specific time period
- User: Actions performed by specific users
- Action Type: Events belonging to specific categories
- Resource: Changes affecting particular resources
- Outcome: Success or failure status
Data Export¶
Audit Log data can be exported in the following formats:
- CSV: For spreadsheet analysis and reporting
- JSON: For programmatic processing and integration
- PDF: For compliance documentation and archival
Retention and Compliance¶
Audit Log retention periods are configured at the organization level and can be adjusted to meet:
- Regulatory compliance requirements (GDPR, SOC 2, ISO 27001)
- Industry-specific standards (PCI-DSS, HIPAA)
- Internal governance policies
- Legal hold requirements
Default retention period: 365 days (configurable based on Enterprise plan)
Activity Logs¶
Overview¶
Activity Logs are maintained for individual Assets and Issues within the platform. These logs provide a chronological record of all changes and interactions specific to each resource, enabling teams to track progress, understand decision history, and maintain context.
Activity Logs are displayed directly on the Asset detail page and Issue detail page.
Asset Activity Logs¶
For each Asset discovered during scanning, the following activities are recorded:
Status Changes
- Asset status transitions (Active, Archived, Ignored)
- Ownership assignments
- Risk classification updates
- Tag additions and removals
Metadata Updates
- Asset name modifications
- Description changes
- Custom field updates
- Integration mappings
Security Events
- New vulnerabilities discovered on the Asset
- Vulnerability status changes
- Remediation progress tracking
- Retest results
Example:
[2024-11-10 09:15:22] Asset status changed from "Active" to "Under Review" by john.doe@example.com
[2024-11-10 09:16:45] Tag "critical-infrastructure" added by john.doe@example.com
[2024-11-10 10:32:11] Comment added: "Scheduling maintenance window for remediation"
Issue Activity Logs¶
For each security Issue identified during scanning, the following activities are tracked:
Status Transitions
- Issue status changes (Open, In Progress, Resolved, False Positive, Accepted Risk)
- Priority adjustments (Critical, High, Medium, Low, Info)
- Assignment to team members
- Due date modifications
Workflow Actions
- Comments and discussions
- File attachments
- External ticket linking (Jira, ServiceNow, Linear)
- Remediation evidence uploads
Resolution Tracking
- Fix verification requests
- Retest scheduling and results
- Closure reasons and justifications
- Reopening events and rationale
Example:
[2024-11-10 11:20:33] Issue status changed from "Open" to "In Progress" by security-team@example.com
[2024-11-10 11:22:15] Comment added: "Patch scheduled for deployment on 2024-11-15"
[2024-11-10 14:45:00] File attached: remediation-plan.pdf
[2024-11-10 16:30:22] Linked to Jira ticket: SEC-1234
Collaboration Features¶
Activity Logs support team collaboration by:
- Displaying all user interactions chronologically
- Preserving comment threads and discussions
- Tracking ownership and responsibility
- Maintaining audit trail for compliance
Scan Logs¶
Overview¶
Scan Logs provide comprehensive, verbose execution traces for each security scan performed by Escape. These logs capture all technical details of the scanning process, including requests sent, actions taken, penetration testing attempts, and system-level events.
Scan Logs are accessed from the Scan detail page within each Application Profile.
Log Categories¶
Scan Logs are organized into multiple stages, each representing a distinct phase of the security assessment:
Initialization Stage
- Scan configuration loading
- Authentication setup and validation
- Target endpoint discovery
- Environment preparation
Discovery Stage
- Asset enumeration
- API endpoint detection
- Schema parsing and analysis
- Technology fingerprinting
Crawling Stage
- Page navigation events
- Form detection and interaction
- JavaScript execution traces
- Network traffic interception
Authentication Stage
- Login flow execution
- Token extraction and validation
- Session management
- Multi-user authentication setup
Fuzzing Stage
- Payload generation and injection
- Request mutation attempts
- Response analysis
- Vulnerability detection logic
Exploitation Stage
- Proof-of-concept execution
- Privilege escalation attempts
- Business logic testing
- Chain attack exploration
Agentic Reasoning Stage
- LLM-driven decision making
- Automated penetration testing logic
- Tool call execution and results
- Adaptive testing strategies
Log Levels¶
Logs are categorized by severity level for efficient troubleshooting:
- Debug: Detailed technical information for development and troubleshooting
- Info: General informational messages about scan progress
- Warning: Non-critical issues that may require attention
- Error: Critical failures affecting scan execution
- Success: Successful completion of significant operations
Log Format¶
Each Scan Log entry follows a standard format similar to traditional software logging:
[2024-11-10 12:45:32.123] [INFO] [Crawling] Navigating to https://api.example.com/v1/users
[2024-11-10 12:45:32.456] [DEBUG] [Crawling] Request headers: {"Authorization": "[REDACTED]", "Content-Type": "application/json"}
[2024-11-10 12:45:32.789] [INFO] [Crawling] Response received: 200 OK (142ms)
[2024-11-10 12:45:33.012] [DEBUG] [Fuzzing] Generating payloads for parameter "userId"
[2024-11-10 12:45:33.234] [WARNING] [Fuzzing] Rate limit detected, implementing backoff strategy
[2024-11-10 12:45:34.567] [ERROR] [Exploitation] Authentication bypass attempt failed: Invalid token format
[2024-11-10 12:45:35.890] [INFO] [Agentic Reasoning] LLM Decision: Attempting alternative injection vector
Filtering and Search¶
Scan Logs can be filtered using multiple dimensions:
By Log Level
- Filter to show only errors and warnings for troubleshooting
- Enable Debug level for detailed technical analysis
- View Info level for high-level scan progress
By Stage
- Focus on specific scanning phases
- Isolate Authentication issues
- Review Agentic Reasoning decisions
- Examine Exploitation attempts
By Keyword
- Search for specific endpoints or parameters
- Locate error messages or exceptions
- Find payload patterns or attack vectors
By Timestamp
- Navigate to specific time ranges
- Correlate events across stages
- Identify performance bottlenecks
Technical Details Captured¶
The following technical information is logged during scan execution:
HTTP Traffic
- Request and response headers
- Request bodies and payloads (with sensitive data redacted)
- Response status codes and timing
- TLS/SSL handshake details
Browser Actions (for WebApp DAST)
- Page navigation events
- Element interactions (clicks, form submissions)
- JavaScript console messages
- Network waterfall timing
Security Testing
- Vulnerability detection logic and reasoning
- Payload variations attempted
- False positive filtering decisions
- Attack chain construction
Agentic Operations
- LLM prompts and responses (when enabled)
- Tool call executions
- Decision-making rationale
- Adaptive strategy adjustments
Performance Metrics¶
Scan Logs include performance data for optimization:
- Request/response timing
- Stage duration measurements
- Rate limiting and backoff events
- Resource utilization statistics
Troubleshooting¶
Scan Logs are essential for diagnosing issues:
- Authentication failures and misconfigurations
- Network connectivity problems
- Rate limiting and blocking detection
- Unexpected application behavior
- False positive analysis
Log Level Selection
For routine monitoring, Info level provides sufficient visibility. Debug level should be enabled when troubleshooting specific issues or working with Escape support to diagnose problems.
Sensitive Data
Authentication credentials, API keys, and other sensitive values are automatically redacted in Scan Logs. However, response bodies may contain sensitive information depending on the application being tested.
Best Practices¶
Audit Logs¶
- Regular Review: Audit Logs should be reviewed periodically to identify suspicious activities or policy violations
- Access Control: Access to Audit Logs should be restricted to authorized security and compliance personnel
- Retention Policies: Retention periods should be configured according to regulatory requirements and organizational policies
- Alert Configuration: Automated alerts should be established for critical security events
Activity Logs¶
- Documentation: Team members should document their actions and decisions in Activity Log comments
- Status Updates: Issue and Asset statuses should be kept current to maintain accurate Activity Log records
- Context Preservation: Historical context should be preserved through Activity Logs for knowledge transfer and auditing
Scan Logs¶
- Troubleshooting: Debug-level Scan Logs should be enabled when investigating authentication issues or unexpected scan behavior
- Performance Analysis: Scan Logs should be reviewed to identify performance bottlenecks and optimization opportunities
- False Positive Investigation: Detailed Scan Logs should be examined when validating potential false positives
- Support Collaboration: Scan Logs should be exported and provided to Escape support when requesting assistance
Enterprise Support
Contact the Escape support team for guidance on log configuration, retention policies, and compliance requirements specific to your organization.