The system would then be organised around topics/sub-topics and trails. A trail can branch into different subjects.
Let’s illustrate with an example.
Topic: Annual Financial Report
The business record of the final topic would reside in the top of several sub-topics.
An incomplete list could include Financial Performance, Sales Statistics and Investments.
The team working on the report would then access different systems and collect a myriad of information to go into the report. Each journey would be recorded in a trail of evidence and journaled, and signed by the Record Signatories, and the evidence attached to trail.
The CEO can then be confident that any number written into the report has been verified, and if they wish, they can see the evidence for themselves. The Process/Business Owner can also verify the process and sight the evidence collected within their ownership but not data that is not for their eyes to see. The public can see the report at the right time, and can independently verify that the evidence was collected, along with public notes, but cannot see the artifacts.
If the company is requested to show evidence of backing their report, then an Auditor Role can be created to access specific trails, and one would anticipate that the likelihood of an audit would be inversely proportional to the rigor of the evidence trail.
A second prominent topic could be Data Integrity. This can be a generic topic to systemically perform checksums in systems of record and report on any issues. Each system can have its own trail and branches to validate data in significant date ranges. The process would create digests of specific views that are expected to remain immutable. Any inappropriate change to the data would be flagged on repeating the process, in which case the System Owner would be able to inspect data against a back-up and rectify specific changes.
Trail: Sales --> Branch: Historic Sales
--> FY23-01: Original: Check 1 = Valid: Check 2 = Valid
--> FY23-02: Original: Check 1 = Invalid
--> FY23-03: Original: Check 1 = Pending
As illustrated, the system seems to have an issue where the data for February changed in March, the System Owner would need to create a rectification action, and either have a Record Signatory confirm the data change was legitimate to reset the Original or correct the records that changed from comparing it to a back-up.
Suppose there was an error in the month of February and the record Signatory has confirmed the changes are legitimate, given our records are immutable then a rectification can be recorded in the trail.
--> FY23-02: Original: Check 1 = Invalid: Original Replaced (signed by user): Check 2 = Valid.
In this scenario the auditor has successfully identified and corrected the data. If this was a valid reason, no further action is required. If the person responsible for the data is concerned about fraud, the back-ups can be retrieved for investigation. An example of fraud could be changing order values at the time of calculating sales commission. In both scenarios, the auditing task is performed immediately so that at year end, the confidence of its veracity is high.
Conclusion
Whist the premiss that a rogue employee will create a criminal mastermind script is a lesser threat (although similar fraud has happened in the past), in imagining such scenario, and exploring a systemic approach to create of evidence of data veracity and identifying tempering, it has been surprisingly fun to me.
With minimal impact to operational processes and with the ability to streamline that auditing activates, such an approach can use cryptograph to prove the integrity of key data.
Businesses can benefit from the increased trust in their brand due to the level of transparency afforded. It’s worth noting that the decoupled nature of the architecture resulting in minimal performance penalties to operational systems and minimal development effort for the target systems.
Whist this solution is only hypothetical, AWS services such as Amazon Quantum Ledger Database, Amazon S3 and AWS Lambda can work together to make-up the basis of such an application.