{"version":"1.0","provider_name":"FinOps School","provider_url":"https:\/\/finopsschool.com\/blog","author_name":"priteshgeek","author_url":"https:\/\/finopsschool.com\/blog\/author\/priteshgeek\/","title":"A Comprehensive Tutorial on Audit Logs in DevSecOps - FinOps School","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VBEDgft7Oi\"><a href=\"https:\/\/finopsschool.com\/blog\/a-comprehensive-tutorial-on-audit-logs-in-devsecops\/\">A Comprehensive Tutorial on Audit Logs in DevSecOps<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/finopsschool.com\/blog\/a-comprehensive-tutorial-on-audit-logs-in-devsecops\/embed\/#?secret=VBEDgft7Oi\" width=\"600\" height=\"338\" title=\"&#8220;A Comprehensive Tutorial on Audit Logs in DevSecOps&#8221; &#8212; FinOps School\" data-secret=\"VBEDgft7Oi\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/finopsschool.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"1. Introduction &amp; Overview What are Audit Logs? Audit logs are detailed, chronological records of events and activities within a system. They capture who performed an action, what action was taken, when it occurred, and where it happened (e.g., which resource or service). In DevSecOps, audit logs are essential for tracking user actions, system events, ... Read more","thumbnail_url":"https:\/\/finopsschool.com\/blog\/wp-content\/uploads\/2025\/05\/Gemini_Generated_Image_oin77goin77goin7-1024x1024.png"}