Skip to content

Audit Logging for AI Assistants

Capture every action: prompt edits, crawl jobs, impersonations, billing changes; keep AI assistants compliant and debuggable.

audit • compliance • ai-assistant • logging

AI assistants influence pricing pages, security answers, and customer trust. Without audit logs you cannot prove compliance or debug incidents. Here is how to build a useful log stream.

Core events to capture

  • Prompt changes: tenant_id, previous prompt hash, new prompt hash, editor, reason.
  • Crawl jobs: domain, run_id, page counts, success/failure, triggered by (schedule, manual, IndexNow).
  • Threshold and policy edits: old value, new value, actor, justification.
  • Admin impersonation: who impersonated whom, start/end time, actions taken.
  • Billing updates: plan tier changes, quota overrides, grace period toggles.
  • Kill switches: embed disablement, reason, scope (tenant vs global).

Event structure

FieldDescription
event_idUnique identifier for traceability
event_typee.g., prompt.update, crawl.run, billing.grace.start
actorUser ID or service account
tenant_idScope of the action
payloadJSON with before/after values
timestampISO string in UTC
source_ip(Optional) for security events

Storage and access

  • Write to an append-only log table in your database or warehouse.
  • Stream critical events to Google Cloud Logging or AWS CloudWatch.
  • Provide export endpoints (CSV/JSON) for customers needing regular audits.
  • Set retention to at least 365 days; allow longer retention per contract.

Alerting and review

  • Trigger Google Chat alerts for high risk actions: prompt updates, impersonations, kill switches.
  • Require dual approval for sensitive actions (e.g., disabling a tenant).
  • Schedule monthly log reviews to satisfy SOC 2 or ISO audits.

Threada implementation

Threada’s ops service logs every action with actor IDs, timestamps, and payloads, and exports them to GCS/BigQuery. Mimic this approach so your assistant deployments remain auditable.***