Skip to content

Sanitize PII from audit log details #144

@Taleef7

Description

@Taleef7

Context

The architecture asks for audit logs on admin-sensitive operations, but advisor_update.md flags that audit_logs.details may include WhatsApp numbers or other sensitive values. The audit log should stay useful without becoming a PII dump.

Acceptance criteria

  • Inventory every insert into audit_logs and identify any phone numbers, payment references, notes, or free-text fields stored in details.
  • Define what is allowed in audit details versus what should be redacted, hashed, truncated, or omitted.
  • Update logging helpers/actions to avoid storing unnecessary PII.
  • Confirm the audit viewer still gives admins enough context to investigate changes.
  • Add tests or code-level assertions for any new sanitizer/helper.

References

  • docs/ARCHITECTURE.md observability and audit logging notes
  • docs/OPS.md data hygiene and privacy sections
  • advisor_update.md Security / hardening: Privacy: WhatsApp numbers in audit logs

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions