Capabilities
Hash-Chain Audit Trail
SHA-256 linked audit entries creating a tamper-evident chain for every compliance action.
Every state-changing action in Caelex — assessment submissions, document uploads, compliance score changes, user access events — is recorded as an AuditLog entry containing a SHA-256 hash of its contents concatenated with the previous entry's hash. This creates a linked chain where modifying any historical entry would invalidate all subsequent hashes. The audit system captures IP address, user agent, authenticated identity, entity type, and a structured diff of what changed. Chain integrity can be verified at any time by recomputing hashes from the genesis entry forward.
Key Capabilities
Cryptographic Linking
Each audit entry includes a SHA-256 hash computed over its payload plus the previous entry's hash, making retroactive tampering computationally detectable.
Comprehensive Event Capture
Records IP address, user agent, authenticated user, action type, affected entity, and structured before/after diffs for every state-changing operation.
On-Demand Verification
Chain integrity validation recomputes the full hash sequence from genesis, flagging any entry where the stored hash diverges from the computed value.