Skip to content

Audit-Ready File Transfer — Structured Evidence for Every Transfer

An audit-ready file transfer system produces structured, traceable evidence for every file that moves through it — so operators and reviewers can answer what happened and when without reconstructing history from application logs.

Every flow run in Xferity writes structured JSON audit events including:

  • timestamp and correlation ID
  • flow name and run ID
  • file name, local and remote paths
  • idempotency key
  • outcome and error details
  • partner context

When tamper-evidence is enabled, events also include:

  • chain_seq
  • prev_hash
  • event_hash

These fields link each event to the previous one so any gap or modification would break the chain.

Operators can trace a single file through its complete lifecycle:

Terminal window
xferity trace orders-2026-03-16.csv

This queries the audit sidecar index and returns all audit events involving that filename.

The audit log is append-only JSONL. It can be:

  • shipped to a SIEM with standard log forwarding tools
  • queried via the HTTP API at GET /api/audit?file=<basename>
  • retained locally with configurable day-based rotation

Audit-ready does not mean compliance-guaranteed. Audit logging improves traceability but does not replace:

  • external immutable retention
  • access controls on the Xferity host
  • SIEM-level event correlation