II.
StackProfile JSON
Structured · livestack-profile:compliance-audit-trail
Compliance & Audit Trail (Go, PostgreSQL, RabbitMQ, Vault, Elasticsearch, Prometheus) json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "stack-profile:compliance-audit-trail",
"_kind": "StackProfile",
"_file": "domain/stack-profiles/deep-stacks-6.yaml",
"_cluster": "domain",
"attributes": {
"displayName": "Compliance & Audit Trail (Go, PostgreSQL, RabbitMQ, Vault, Elasticsearch, Prometheus)",
"description": "An immutable audit trail system that captures, indexes, and monitors\nevery compliance-relevant event across the organization. Go services\ningest events from RabbitMQ queues and write append-only records to\nPostgreSQL with cryptographic hash chains for tamper evidence.\nElasticsearch provides full-text search over millions of audit entries\nfor investigator queries and regulatory reporting. HashiCorp Vault\nmanages encryption keys and secrets for data-at-rest protection.\nPrometheus tracks ingestion lag, storage growth, and query latency.\nThe tradeoff is storage cost growth over time and the difficulty of\nbalancing retention policies with regulatory hold requirements.\n",
"composes": [
"language:go",
"tool:psql",
"tool:rabbitmq",
"tool:vault",
"tool:elasticsearch",
"tool:prometheus",
"library:zerolog",
"library:chi"
]
},
"outgoingEdges": [
{
"from": "stack-profile:compliance-audit-trail",
"to": "language:go",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "tool:psql",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "tool:rabbitmq",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "tool:vault",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "tool:elasticsearch",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "tool:prometheus",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "library:zerolog",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "library:chi",
"kind": "composed_of"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "role:compliance-engineer",
"kind": "used_by_role"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "role:security-engineer",
"kind": "used_by_role"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "role:audit-analyst",
"kind": "used_by_role"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "workflow:compliance-audit",
"kind": "follows_workflow"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "workflow:access-control-audit",
"kind": "follows_workflow"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "domain:compliance",
"kind": "applies_to"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "domain:security",
"kind": "applies_to"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "skill-area:compliance-automation",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "skill-area:search-indexing",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "skill-area:secrets-rotation",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "skill-area:observability-instrumentation",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:compliance-audit-trail",
"to": "skill-area:event-driven-architecture",
"kind": "requires_skill_area"
}
],
"incomingEdges": []
}