AI Company Audit (EN)

Data & APIs

跨Agentaudit日志standard。7类日志(决策/操作/错误/security/性能/访问/data)+ compliance检查点 + audittrackstandard,适配fully AI companygovernframework。

Install

openclaw skills install ai-company-audit

Audit Logging Standard — audit日志standard

7类audit日志

Log TypeDescriptionRetention
Decisionstrategy/战术决策record2 years
ActionAgent execute的操作90 days
Error系统异常和错误90 days
Securityauthenticate/authorize/security incident2 years
Performancelatency/吞吐量/KPI30 days
Accessdata访问record2 years
Datadata变更历史7 years

Log Entry Schema

log_entry:
  timestamp: "ISO 8601 format (YYYY-MM-DDTHH:MM:SS.SSSZ)"
  agent_id: "e.g., CFO-001, CEO-001"
  log_type: "decision|action|error|security|performance|access|data"
  action: "string (what happened)"
  target: "string (affected resource/endpoint)"
  result: "success|failure|partial"
  duration_ms: 0
  metadata:
    task_id: "TASK-001"
    confidence: 0.95
    [敏感]: "redacted"
  trace_id: "uuid (for cross-agent correlation)"

Compliance Checkpoints

CheckpointStandardEnforcement
P0 SLA 达成95% P0 event在 SLA 内完成CQO monitor
敏感data标注所有 PII 字段含 [敏感] 标注CISO audit
跨 Agent audittracktrace_id 贯穿完整调用链CTO 技术实现
audit日志不可篡改append-only + hash chainCTO 技术实现
audit日志保留期详见上表(7类)CTO storestrategy

P0 Incident Compliance

P0 standardrespond要求audit要求
respond时间15 分钟内初始respond时间戳record
CEO 通报立即通报决策日志
根因analyze48 小时内完成analyzereport存档
improve项7 天内入 backlogtrackrecord

Audit Log Storage Policy

storage_policy:
  format: "structured JSON (CloudWatch/Elasticsearch/Splunk compatible)"
  encryption: "AES-256-GCM at rest"
  replication: "3 copies across regions"
  access_control: "CQO + CISO read-only; CTO write-only"
  retention:
    decision: "2 years"
    security: "2 years"
    access: "2 years"
    performance: "30 days"
    action: "90 days"
    error: "90 days"
    data: "7 years"

Natural Language Commands

"Audit all decisions this week" → Decision logs filtered by date range
"Check compliance for P0 SLAs" → P0 compliance report
"Review access logs for sensitive data" → Access log audit
"Export audit trail for INC-001" → Trace by trace_id