Introducing Security Audit and Monitoring — v1.0.71
Introducing Security Audit and Monitoring — v1.0.71
Version 1.0.71 ships a comprehensive security monitoring layer built directly into the platform. This release is aimed at security teams, compliance officers, and platform administrators who need continuous visibility into threats, anomalies, and incident activity across their tenants.
What's New
Threat Detection
The platform now monitors activity in real time and matches it against a library of known threat patterns. When a threat is identified it is classified by severity:
| Severity | Description |
|---|---|
| Low | Informational; no immediate action required |
| Medium | Review recommended within 24 hours |
| High | Review recommended promptly |
| Critical | Immediate action required; automated response may trigger |
All detected threats appear in the Security section of the admin console under Threat Events.
Anomaly Analysis
Anomaly analysis builds a rolling baseline of expected behaviour for users and system processes within each tenant. Deviations from that baseline are scored and surfaced automatically — no manual rule configuration needed to get started.
What is baselined:
- Login times and locations
- API call volumes and patterns
- Data access and export activity
- Privilege escalation attempts
Anomaly scores and supporting context are visible in the Anomaly Explorer view, allowing administrators to investigate and mark events as expected or suspicious.
Automated Security Incident Response
Playbooks let you define the automatic actions the platform takes when a threat or anomaly crosses a threshold you choose. This reduces response time without requiring human intervention for well-understood scenarios.
Supported automated actions:
- Suspend the affected user account
- Terminate all active sessions for a user
- Send an alert notification to designated administrators
- Capture a full audit log snapshot associated with the incident
Playbooks are created and managed in Settings → Security → Response Playbooks.
Comprehensive Security Reporting
Administrators can generate on-demand reports covering:
- Threat event summaries (count, severity distribution, resolution status)
- Anomaly trend lines over configurable date ranges
- Incident timelines showing detection, response, and resolution steps
Reports can be exported as PDF (suitable for audit submissions) or CSV (suitable for further analysis). Report scope is limited to the requesting user's tenant.
Compliance Dashboards
The new compliance dashboard provides a high-level view of your organisation's security posture. Key metrics are mapped to control categories commonly required during audits, giving compliance officers a single place to assess readiness and identify gaps before a formal review.
The dashboard is accessible to users with the Security Admin or Compliance Officer role.
Getting Started
- Navigate to Security in the admin console.
- Review any pre-populated threat events or anomalies detected since your last login.
- Visit Settings → Security → Response Playbooks to configure automated response actions.
- Open the Compliance tab to review your current posture metrics.
- Use Reports → Security to generate and download your first security report.
Permissions
| Feature | Required Role |
|---|---|
| View Threat Events | Security Admin, Compliance Officer, Super Admin |
| Manage Response Playbooks | Security Admin, Super Admin |
| View Anomaly Explorer | Security Admin, Super Admin |
| Export Security Reports | Security Admin, Compliance Officer, Super Admin |
| View Compliance Dashboard | Security Admin, Compliance Officer, Super Admin |
Released in v1.0.71. For questions, contact your platform administrator or refer to the Changelog for full version history.