Skip to content

Course 3: MIFY for Business — Chapter 5

Use MIFY’s audit and security features for regulated environments.

  • Using the audit log for compliance
  • Data classification and DLP
  • Security best practices

MIFY Admin Audit

Every significant action is logged at /admin/audit:

  • Workflow executions (who, when, what)
  • HITL decisions (approved/rejected, by whom)
  • Configuration changes
  • Authentication events

Features:

  • Checksum chaining — tamper-evident (each entry references the previous)
  • Category-specific retention — auth logs 365 days, security events up to 7 years
  • Export — JSON and CSV for compliance reporting
  • Integrity verification — detect if logs have been modified

MIFY automatically classifies data flowing through workflows:

ClassificationExamplesProtection
PublicMarketing contentNormal handling
InternalBusiness reportsLogged, access-controlled
ConfidentialCustomer PIIRestricted, DLP patterns active
RestrictedFinancial data, secretsHash-only logging, no-storage mode

Built-in detection patterns:

  • Social Security Numbers
  • Credit card numbers
  • API keys and tokens
  • AWS keys, GitHub PATs
  • Private keys

When detected, MIFY can: redact, block, alert, or log only.

For compliance workflows, compare runs side-by-side:

  • Set a baseline execution
  • Compare new runs against the baseline
  • See what changed in inputs, outputs, and AI responses
  • Useful for: regression testing, model drift detection, audit reviews
SettingWhereRecommended
Enable SSO/admin/org/securityYes for enterprise
Set workspace policies/admin/workspaces/[id]/securityPer-team restrictions
Configure audit retention/admin/auditMatch your compliance requirements
Enable DLP/admin/policyYes for regulated industries
Review credential access/admin/quotaRegular access reviews
Set budget caps/admin/quotaPrevent cost overruns
  1. How do you set up user roles? → Admin → Identity (/admin/identity)
  2. What are the three user roles? → Admin, User, Expert
  3. How does the policy engine resolve conflicts? → Deny-takes-precedence
  4. How do you export audit logs?/admin/audit → Export (JSON/CSV)
  5. What are the four data classification levels? → Public, Internal, Confidential, Restricted

Previous: Chapter 4 — Cost Control | Back to Courses