1. Introduction
Corbado’s Security Log provides comprehensive event logging using the industry-standard OCSF (Open Cybersecurity Schema Framework). This standardized logging system captures authentication and identity management events in a vendor-agnostic format, making it ideal for SIEM integration, security monitoring, and threat detection.Corbado also maintains a separate Audit Log with a custom format designed for compliance requirements. While some events appear in both logs, the Security Log uses the standardized OCSF schema for better interoperability with security tools.
1.1 Security Log vs. Audit Log
Corbado provides two separate logging systems that serve different purposes:Aspect | Security Log | Audit Log |
---|---|---|
Format | OCSF 1.6.0 (standardized) | Custom format |
Primary Purpose | SIEM integration, security monitoring | Compliance & regulatory requirements |
Best For | Security teams, SOC analysts, threat detection | Auditors, compliance officers, regulatory audits |
Event Coverage | IAM events using OCSF classes | Broader custom events for compliance needs |
Interoperability | High (vendor-agnostic standard) | Custom (flexible for specific requirements) |
- Integrating with SIEM platforms (Splunk, Datadog, etc.)
- Real-time security monitoring and alerting
- Standardized security event analysis
- Cross-platform security correlation
- Meeting specific compliance framework requirements (ISO 27001, SOC 2, HIPAA)
- Custom audit trail requirements
- Regulatory reporting with specific data fields
- Long-term compliance record keeping
1.2 Key Features
- OCSF Standardized Format: Based on OCSF (Open Cybersecurity Schema Framework), a widely adopted, vendor-agnostic global standard for cybersecurity event logging and reporting
- SIEM-Ready: Pre-formatted for seamless integration with major SIEM platforms without custom parsing
- Complete IAM Event Coverage: Automatically captures authentication, authorization, and identity management events
- Tamper-Proof Storage: All security logs are stored using Write-Once-Read-Many (WORM) technology, ensuring data integrity and preventing unauthorized modifications
- Long-Term Retention: Security logs are retained for up to 10 years, depending on your requirements
- Real-Time Streaming: Stream security log events to external systems like SIEM platforms for real-time monitoring and analysis
Corbado Connect implements version 1.6.0 of the OCSF schema specification.
2. Event Types
Corbado captures security log events from different operational areas to provide comprehensive visibility into the authentication infrastructure. The security log covers the following event types (called classes in OCSF):- Account Change (3001): Captures user account management activities such as account creation, modification, deletion, password changes, status changes (enabled, disabled, locked, unlocked), and multi-factor authentication configuration updates (see schema)
- Authentication (3002): Records authentication session activities including login and logout attempts (both successful and failed), authentication ticket requests, and other key authentication process stages. These events include details about the user, authentication method, and attempt status (see schema)
- Entity Management (3004): Tracks activities performed by managed clients, microservices, or users at management consoles. Covers create, read, update, and delete operations on managed entities, as well as enrollment, status changes, and lifecycle management actions (see schema)
- User Access Management (3005): Documents changes to user privileges, including the assignment and revocation of permissions that control access to specific resources (see schema)
- Group Management (3006): Logs group-related operations including privilege assignments, user membership changes (additions and removals), subgroup management, and group lifecycle events such as creation and deletion (see schema)
- API Activity (6003): Records general API operations following the CRUD pattern (Create, Read, Update, Delete), capturing API calls made across the infrastructure with details about the request, response, and affected resources (see schema)
Authentication events are logged for all user interactions across your entire authentication infrastructure. This includes both end-users of your application using Corbado Connect and administrative users accessing the Corbado Management Console. All authentication attempts, whether successful or failed, are captured with full context to ensure complete security coverage and support investigations.
3. Streaming
All security log events can be streamed in real-time to external systems for monitoring, analysis, and compliance purposes. Our streaming implementation includes robust retry logic to ensure reliable delivery of security events. This capability is particularly useful for feeding security log events into your SIEM (Security Information and Event Management) system for centralized security monitoring and alerting.3.1. Supported Destinations
Corbado supports streaming to the following systems:- Amazon EventBridge
- Coralogix
- Datadog
- Dynatrace
- Elastic
- Honeycomb
- LogicMonitor
- New Relic
- Snowflake
- Splunk
- Sumo Logic