The access log captures auditable records about the database objects that users access, the frequency of access, and whether or not the access is denied. Various government and industry regulations, such as the Sarbanes-Oxley law in the United States, require logging to trace user activity in databases that contains confidential information.