Events done on the security configuration are logged in the security history. So, you can monitor the changes to the security configuration.
These events are logged:
Audit log initialized
Duty created
Duty deleted
Duty modified
Objects published
Privilege created
Privilege deleted
Privilege modified
Role assigned
Role assigned dynamically
Role created
Role deleted
Role locked
Role merged
Role modified
Role removed
Role removed dynamically
Role unlocked
Security configuration exported
Security configuration imported
SoD conflict allowed
SoD conflict denied
SoD rule created
SoD rule deleted
SoD rule modified
SoD rules validated
Stand-in role assigned
Stand-in role removed
Stand-in rule conflict
Stand-in rule created
Stand-in rule deleted
Stand-in rules applied
User created
User deleted
User disabled
User enabled
User modified
Steps
Click Security management.
Click the History tab.