Permission Logs for change/create/delete operations
None of the Role changes, use permission updates are logged.
There is an audit log table but it is not functional.
* Any intruder can create a user than create some VMs and give permissions to the VM's and than delete itself again.. and no-one can track what happened how these machines are created who give the permissions ..
* If you by mistake change something on roles and would like to revert your change back there is no possibility
* if someone will say "Add my SSH keys to all" on the role, for some time and then remove that permission, we would never know who did that..