Audit-proof archiving is not a single feature, but an interplay of several technical measures:
Hash Verification (SHA-256)
When archiving, a cryptographic hash value is calculated for each document (typically SHA-256). This hash value acts as a digital fingerprint: even the smallest change to the document, such as a single space or a changed pixel, produces a completely different hash value. By regularly comparing stored hash values with the current document inventory, any manipulation is immediately detected.
Timestamps
Each archived document receives a qualified timestamp documenting the exact moment of archiving. Combined with the hash value, this creates cryptographic proof that the document existed in a specific state at a specific point in time. This is a decisive advantage in legal disputes and tax audits.
Access Log (Audit Trail)
A complete access log documents every interaction with the archive: who accessed, downloaded, exported, or printed which document, and when? This log is itself immutable and is regularly requested during tax audits. It proves that the organisation ensures proper handling of its records.
Versioning
If a document needs to be supplemented or corrected after archiving (e.g., a reversal for an invoice), the original is not overwritten. Instead, a new version is created. The original version remains unchanged. This makes the entire document history traceable, a central GoBD requirement.
PDF/A as Archiving Format
The PDF/A format (ISO 19005) is the standard for long-term archiving. Unlike regular PDF, PDF/A embeds all required resources such as fonts, does not allow external dependencies, and does not permit JavaScript execution. This ensures that the document looks exactly the same in 10, 20, or 30 years as it did at the time of archiving.
Access Permissions
A role-based permission system ensures that only authorised individuals can access documents. Administrators define who may view, download, or export which document categories. This not only protects against unauthorised access but also fulfils GDPR requirements for access control.