One of the key functions of an effective Identity and Access Management (IAM) solution is data logging, to capture and…