Basically, we could give non-superuser ssh access to one of the security folks that we trust, so that they could at any time, ssh in and verify the logs are not being kept. Then they publish what they find periodically. Kind of like how companies do independent security audits.
What about this? https://audgit.ai/
Auditing the code is not enough, we would need to audit the state of the server since most of these servers allow ssh access the state of the system can be changed at any time by an operator.
An even further issue is that in the case of allowing an auditor in, it would expose secrets as well.
This is cool, but yeah, it’d have to be combined with something to audit to deployment as well.