Skip to content
← Blog · Engineering ·

Designing audit logs you can actually trust

How tamper-evident hash chains change incident response and what we learned implementing them in production.

EntryBit Team
Staff Engineer
6 min read

Why audit logs matter more than you think

When a security incident happens, the first thing investigators reach for is the audit log. But here’s the uncomfortable truth: most audit logs can be silently modified by anyone with database access.

If your audit log is just rows in a SQL table, it’s not an audit log — it’s a suggestion.

Our approach: hash chains

Every event in EntryBit’s audit log includes a cryptographic hash of the previous event. This creates an immutable chain — if anyone modifies or deletes a single entry, the chain breaks and the tampering is immediately detectable.

The implementation details matter:

  • SHA-256 hashing with the previous event’s hash as input
  • Periodic checkpoints signed with a hardware security module
  • Export verification — any exported log bundle can be independently verified without our system

What this means for compliance

For any security audit, tamper-evident logging isn’t just nice to have — it fundamentally changes your audit story. Instead of “we believe our logs are accurate,” you can say “our logs are cryptographically verified.”

That’s a conversation compliance teams want to have.