You can specify the directory, file, and table operations to audit in a security policy. If you specify the operations to audit in a security policy and tag data objects (such as volumes and tables) with the policy, the enforcement mode setting in the policy is used to determine how the setting affects auditing of operations on the data objects. For more information, see Volume-Level Security Policy Enforcement Mode.
You can specify the directory, file, and table operations to audit in a security policy using the Control System, CLI, and the REST API.