UCloud logo UCloud logo UCloud
v2025.1.0
  1. UCloud/Core
  2. 1. Introduction
  3. 2. Projects
  4. 3. Accounting
  5. 4. Orchestration
  6. UCloud/IM for Slurm-based HPC
  7. 5. Installation
  8. 6. Architecture and Networking
  9. 7. User and Project Management
  10. 8. Filesystem Integration
    1. 8.1. Inter-provider file transfers
  11. 9. Slurm Integration
    1. 9.1. Application Management
    2. 9.2. Built-in Applications
  12. 10. Reference
    1. 10.1. Configuration
    2. 10.2. CLI
  13. 11. Appendix
    1. 11.1. Built-in Application Index
  14. UCloud/IM for Kubernetes
  15. 12. Installation
  16. 13. Architecture and Networking
  17. 14. Filesystem Integration
  18. 15. Compute Jobs
    1. 15.1. Public Links
    2. 15.2. Public IPs
    3. 15.3. License Servers
    4. 15.4. SSH Servers
  19. 16. Integrated applications
    1. 16.1. Syncthing
    2. 16.2. Integrated terminal
  20. 17. Reference
    1. 17.1. Configuration
  21. H: Procedures
  22. 18. H: Procedures
  23. 19. H: Introduction
  24. 20. H: Auditing
  25. 21. H: Auditing scenario
  26. 22. H: GitHub actions
  27. 23. H: Deployment
  28. 24. H: 3rd party dependencies (risk assesment)
  1. Links
  2. Source Code
  3. Releases

Auditing scenario

The following UCloud usage scenarios are used to manually verify that the complete auditing stack works. This is currently not machine tested.

Internal Auditing: #1 File Activity

There has been created a users on the production system to help with this test:

  • audit1

The person responsible for our logging architecture has the 2FA and other credentials to these users.

Steps:

  1. Create a directory called Audit-$DATE
  2. Upload a file called file.txt to the new directory
  3. Check if other user can see the file (copy URL to of file location to other users browser)
  4. Copy this file to the same directory using the rename strategy (default)
  5. Move the new copy to the trash
  6. Rename file to renamed
  7. Mark renamed as a favorite file
  8. Unmark renamed as a favorite file

Internal Auditing: #2 Project Activity

This Audit requires 3 different users. There has been created additional 2 users on the production system to help with this test:

  • audit2
  • audit3

The person responsible for our logging architecture has the 2FA and other credentials to these users.

Steps:

  1. audit1 applies for a project called AUDITTEST-$DATE which is approved
  2. audit1 invites audit2
  3. audit2 accepts the invite
  4. audit1 upgrades audit2 to admin
  5. audit2 invites audit3 to the project
  6. audit3 accepts the invite
  7. audit3 uploads a file to his personal workspace called file.txt
  8. audit3 classifies the file as Sensitive
  9. audit2 creates a group with audit3 in it
  10. audit2 creates a drive in the project with read permissions to the new group
  11. audit3 attempts to move file to read only folder and fails
  12. audit2 changes permissions to write
  13. audit3 moves the file to new drive in the project
Previous H: Auditing
Next H: GitHub actions