Generating Audit Reports and Access Reviews

How to create, save, export and schedule access logs & reports with Apono


With Apono, you can easily create, save, export and schedule access logs reports.

Every access request and every step in the access lifecycle are fully logged, so that you can:

  • Submit detailed audit reports to external auditors to satisfy compliance standards
  • Automate reports creation as required in your organization: daily, weekly, monthly, quarterly, yearly, etc.
  • Cover the exact scope of reporting required for your organization, for example access to production, access to sensitive repositories or datasets, etc.
  • Export access logs in CSV form and import logs into ITSM or SIEM tools
  • To send Apono access logs into other tools in your organization's stack using Webhooks, read this guide.

How it works

Apono logs every access request and every decision and action taken in the access lifecycle.

If you need to generate access logs or audit reports for internal Security or GRC teams & tools or for external auditors, you can use our Reports Page pr Public API:

Using the Reports page

  1. In the Apono app, navigate to the Activity Page
  2. Click the Reports tab
    1. See saved reports you created previously
  3. Create a new report by clicking 'Create Report'
    1. Insert report name
    2. Filter the data you need. You may filter by:
      1. Requester
      2. Integration
      3. Resource Type
      4. Resource
      5. Permission
      6. Status
      7. Requests time frame (*the default is last 30 days)
    3. The reports page presents the first 10 results as a preview. To see complete results, download the report.
  4. Download the report in CSV format by clicking Download Report
  5. To save your query for future use, click Create Report. The report results will refresh over time based on your original query.
  6. You can schedule reports generation using Cron expressions syntax. This will automatically create and send you access logs reports periodically.
    1. Insert the email addresses of recipients who need to receive the reports, separated by commas.

Using the Public API

You can create access logs reports using our Public API. Read more in the API Reference.