Skip to main content
QMSQMS
QMS
  • Welcome to your QMS
  • Quality Manual
  • Procedures
  • Records
    • GP-001 Documents and records control
    • GP-002 Quality planning
    • GP-003 Audits
    • GP-004 Vigilance system
    • GP-005 HR and training
    • GP-007 Post-market surveillance
    • GP-009 Sales
    • GP-010 Suppliers
    • GP-012 Design, Redesign and Development
    • GP-018 Infrastructure and facilities
    • GP-019 Software validation
    • GP-023 Change control management
    • GP-050 Data Protection
    • GP-051 Security violations
      • R-051-001 API event logs 2023_001
      • R-051-002 Security groups
      • R-051-003 EC2 instances
    • GP-052 Data Privacy Impact Assessment (DPIA)
    • GP-200 Remote Data Acquisition in Clinical Investigations
  • TF_Legit.Health_Plus
  • Licenses and accreditations
  • External documentation
  • Records
  • GP-051 Security violations
  • R-051-001 API event logs 2023_001

R-051-001 API event logs 2023_001

  • Governed by GP-051 Security violations
  • Comes from template T-051-001 API event logs

Purpose​

Review API events logs looking for suspicious actions

Periodicity​

Every 2 weeks

AWS CloudTrail review​

ResponsibleDateEvent history reviewInsights review
Gerardo Fernández Moreno2023/01/10OKOK
Alejandro Carmena Magro2023/10/02OKOK
Alejandro Carmena Magro2023/10/16OKOK
Alejandro Carmena Magro2023/10/30OKOK
Alejandro Carmena Magro2023/11/13OKOK
Alejandro Carmena Magro2023/11/27OKOK
Alejandro Carmena Magro2023/12/11OKOK
Alejandro Carmena Magro2023/12/22OKOK
Alejandro Carmena Magro2024/01/08OKOK
Alejandro Carmena Magro2024/01/22OKOK
Alejandro Carmena Magro2024/02/05OKOK
Alejandro Carmena Magro2024/02/19OKOK
Help

At the review columns it will be indicated if the review was satisfactory (OK) or if any unexpected action was detected (see below). In this case the reference of the incidence (according to procedure GP-018 Infrastructure and facilities) or non-conformity (GP-006 Non-conformity. Corrective and Preventive actions) was included to allow traceability of the actions.

Criteria for acceptance​

The logs are reviewed and no suspicious actions are detected:

  • Each user is connecting from the expected IP.
  • Users are performing the expected actions.

List of unexpected actions:

  • Changing other user's credentials.
  • Creating new users with administrator permissions.
  • Accessing resources that are not part of the project.
  • Deleting critical resources as buckets, databases or EC2 instances.

Record signature meaning​

  • Author: JD-017 Alejandro Carmena
  • Review: JD-004 María Diez
  • Approval: JD-001 Andy Aguilar
Previous
GP-051 Security violations
Next
R-051-002 Security groups
  • Purpose
  • Periodicity
  • AWS CloudTrail review
    • Criteria for acceptance
  • Record signature meaning
All the information contained in this QMS is confidential. The recipient agrees not to transmit or reproduce the information, neither by himself nor by third parties, through whichever means, without obtaining the prior written permission of Legit.Health (AI LABS GROUP S.L.)