Skip to main content
ImmutableLog logo
← All articles
Security & Risk5 min readMarch 5, 2026

The Day a Regulator Asks: "Can You Prove This Event Happened?"

Logging explains what happened. Proof protects you when the stakes are highest. Here is what changes when explanation is no longer enough.

The Day a Regulator Asks: "Can You Prove This Event Happened?"

The Question That Changes Everything

There are moments in a company’s life when a single question reveals whether the engineering decisions made years earlier were actually the right ones.

One of those questions is: "Can you prove this event happened?"

Not "do you have a record of it." Every company has records. "Can you show me a log?" Any system can produce logs. The real question is whether you can prove that the record is accurate, that it has not been altered since it was written, and that the event it describes actually occurred.

That question comes from regulators. It comes from enterprise customers during vendor security reviews. It comes from lawyers during discovery. And it comes from board members after a breach, when they want to know exactly what happened and when.

Your answer either closes the conversation in your favor or opens a much harder one.

The Difference Between a Record and Proof

Many engineering teams treat logging and proof as if they were the same thing. They are not.

A log record is a description of an event. It reflects what the system recorded at a given moment, through the process that wrote it. But a description can be changed after the fact. The message can be edited, the timestamp can be modified, or the record can be deleted altogether. In a conventional logging system, those changes may leave no visible trace.

Proof is different.

Proof means that a third party, someone who was not present when the event occurred and has no special reason to trust your systems, can independently verify that the record is authentic and has not been changed.

Proof does not depend on trust. It depends on mathematics.

And that gap between record and proof is exactly where many organizations discover they have a problem, usually at the worst possible moment.

Three Scenarios Where the Gap Becomes Expensive

Scenario 1: Financial Services Under Regulatory Review

A financial services company is under review after a customer complaint. The regulator asks for evidence of every action taken on the customer’s account during a specific three-week period, along with assurance that the records have not been modified.

The engineering team retrieves the logs from the database. The records exist. But when the regulator asks for technical evidence that the logs are accurate, not just present. The answer becomes: "Our access controls ensure that only authorized personnel can modify them."

The regulator then asks who those authorized personnel are. The list includes database administrators. The next question is obvious: could those administrators have modified the records?

The honest answer is yes.

At that point, what should have been a straightforward evidence submission turns into a longer investigation involving access histories, personnel records, and change-management logs, none of which are any more tamper-evident than the original records.

Scenario 2: Enterprise Vendor Assessment

A software company is competing for a contract with a large enterprise customer in the financial sector. During vendor due diligence, the customer’s security team asks for evidence that audit logs cannot be modified by internal staff.

The vendor explains that logs are stored in the primary database and protected by role-based access controls. Only the operations team has write access.

The customer then asks: "Can you prove, cryptographically, that no record has been altered?"

The vendor cannot.

They lose the contract to a competitor that can answer yes, supported by a write-once, hash-chained audit log architecture.

In enterprise B2B sales, especially in regulated markets, the ability to answer that question with confidence is becoming more than a differentiator. It is increasingly a filter.

Scenario 3: Legal Dispute Over Access to Confidential Information

A company is involved in litigation over whether an employee accessed confidential information they were not authorized to view. The legal team presents access logs as evidence that the employee did not access the relevant files.

Opposing counsel asks whether those logs could have been altered. The system administrator confirms that, technically, someone with DBA privileges could modify the records.

The logs are still admitted, but their evidentiary weight is reduced because they cannot be independently verified as unaltered.

The case then depends on other evidence. The logs, which should have been decisive, become merely suggestive.

The cost of that uncertainty shows up in legal fees, settlement pressure, and reputational risk.

Logging Explains. Proof Protects.

This is not just a marketing phrase. It is a practical distinction.

Logs explain what a system recorded. When something goes wrong, they help teams reconstruct events, debug issues, monitor behavior, and investigate incidents. Those are valuable and necessary functions.

But when the question changes from "what do your records say?" to "can you prove your records are accurate?" explanation stops being enough.

A log is only as reliable as the system’s ability to prevent or detect alteration. In a mutable logging system, that reliability depends heavily on access controls, controls that can fail, be bypassed, or be abused.

Proof requires something stronger: the ability for a third party, with no system access and no special trust in the organization, to independently verify that a specific record is authentic.

What Proof Requires Technically

To provide cryptographic proof of event integrity, three technical properties are required:

  1. A hash at write time: each event must be cryptographically hashed when it is written, creating a unique fingerprint tied to its exact contents.

  2. A chain of custody: each event’s hash must incorporate the hash of the previous event, creating a tamper-evident sequence in which any modification becomes detectable.

  3. Independent verification: a third party must be able to verify the record using only the event data and the hash specification, without depending on proprietary infrastructure or internal trust assumptions.

Together, these properties transform a log from a description into evidence.

The hash is the seal. The chain is the timeline. Independent verification is what makes both defensible.

The Cost of Not Having Proof

Organizations that discover they cannot provide cryptographic proof of log integrity often face one or more of the following consequences:

  • Failed or delayed audits: SOC 2, ISO 27001, and PCI DSS assessments increasingly depend on technical evidence of log integrity, not just written policy.
  • Lost enterprise deals: large buyers in regulated industries are beginning to treat log integrity as part of vendor security due diligence.
  • Regulatory exposure: when verifiable evidence cannot be produced, regulators may assume a weaker control environment and respond accordingly.
  • Legal weakness: records that could have been altered are less persuasive in court, arbitration, or formal investigations.
  • Reputational damage: under scrutiny, the inability to prove record integrity raises broader concerns about the organization’s security posture and trustworthiness.

None of these outcomes are theoretical. They happen regularly when the gap between logging and proof becomes visible at exactly the wrong time.

Build Proof Into the System Before the Regulator Arrives

The first time you answer the regulator’s question, "can you prove this event happened?", should not be during an investigation.

That answer should already exist as a known capability, built into the system, testable in advance, and demonstrable on demand.

The right time to build cryptographic audit trail integrity is not after the regulatory inquiry. Not after the enterprise customer asks for it. Not after litigation begins.

It is at the architectural moment when you decide how events are written, stored, and verified.

The organizations that answer this question confidently do not build that confidence in response to pressure. They build it years earlier, in the design of their logging infrastructure.


See how ImmutableLog helps teams move from logging events to proving them. Talk to us →

Share
complianceaudit logstamper-proof records