Data Integrity
Tamper-proof log signing, signature verification, and Bring Your Own Key (BYOK) for audit evidence.
How Log Signing Works
Overview of Ed25519 digital signatures for tamper-proof analysis logs.
Verifying Signatures
How to verify log file signatures in the application and export public keys for auditors.
IT Auditor Verification Guide
How IT auditors can verify that data and rulesets were not altered between extraction and analysis.
Independent Verification
Step-by-step instructions for auditors to verify log signatures on Linux, macOS, and Windows.
Bring Your Own Key (BYOK)
Configure your own Ed25519 signing key for non-repudiation and stronger audit guarantees.