Security & SecOps JSON Examples
Security teams rely on structured JSON logs to detect threats, audit access, and meet compliance requirements.
Example 1: User Login Audit Log
{
"eventType": "USER_LOGIN",
"userId": "USR-1002",
"ipAddress": "203.0.113.42",
"status": "SUCCESS",
"authMethod": "MFA",
"device": "Chrome / Windows",
"timestamp": "2026-01-11T08:40:00Z"
}Example 2: IAM Permission Change
{
"eventType": "IAM_POLICY_UPDATE",
"actor": "admin_user",
"targetRole": "payment-service-role",
"action": "ATTACH_POLICY",
"policyName": "AmazonS3ReadOnlyAccess",
"region": "us-east-1",
"timestamp": "2026-01-11T09:15:30Z"
}Example 3: Intrusion Detection Alert
{
"alertId": "ALRT-77821",
"severity": "HIGH",
"sourceIp": "45.33.22.18",
"attackType": "Brute Force",
"attempts": 32,
"blocked": true,
"detectedAt": "2026-01-11T10:05:00Z"
}Example 4: API Abuse Detection
{
"event": "RATE_LIMIT_EXCEEDED",
"apiKey": "pk_live_9921",
"endpoint": "/api/v1/payments",
"requestsPerMinute": 420,
"limit": 100,
"actionTaken": "TEMP_BLOCK",
"timestamp": "2026-01-11T10:20:00Z"
}Example 5: Compliance Audit Record
{
"auditId": "CMP-5512",
"framework": "ISO27001",
"control": "Access Management",
"status": "PASS",
"reviewedBy": "security-team",
"reviewDate": "2026-01-10",
"evidenceStored": true
}Format & Explore JSON Instantly
Use these real-world JSON examples to test formatting, validation, and syntax highlighting with our online tool.
Analyze security JSON in Viewer →