Back to blog
PrimentraPrimentra
·March 8, 2026·7 min read

The audit trail nobody reads until something goes wrong

Home/Blog/The audit trail nobody reads until something goes wrong
Audit Trail — SuppliersLast 7 days
Mar 5, 14:32J. van DijkBank AccountNL91ABNA04417164DE89370400440532013000
Mar 5, 14:31J. van DijkContact Emailinfo@acme-supply.nlbilling@acme-supply.nl
Mar 4, 09:15S. BakkerAddressKeizersgracht 401Keizersgracht 401-A
Mar 3, 16:48M. de GrootVAT NumberNL001234567B01NL001234567B02
Mar 1, 11:20S. BakkerPhone+31 20 555 0100+31 20 555 0142
Bank account changed to foreign IBAN — requires review

A supplier's bank account changed from a Dutch IBAN to a German one. One row in the audit log. Without that row, the next payment run sends € 340,000 to an account nobody verified. With it, someone catches the change in a routine review, picks up the phone, and confirms it's legitimate before the money moves.

That's the gap between organizations that treat audit trails as a compliance checkbox and those that actually use them. The feature is identical. The difference is whether anyone looks.

Transaction logs are not audit trails

I hear this one constantly: "We have SQL Server, so we already have an audit trail." No. You have a transaction log. It records page writes and index updates for crash recovery. Try answering "who changed supplier X's bank account and what was the previous value?" from the transaction log. You'll spend a day parsing binary log records that were never meant for human consumption.

SQL Server Change Data Capture gets you closer — it captures row-level changes. But it still doesn't tell you who made the change unless your application passes user context through to the database session. Most don't. CDC tells you the "what" but not the "who," which is exactly the piece auditors and regulators care about.

A real audit trail for master data needs five things:

WhoThe authenticated user, not a generic service account
WhenTimestamp precise enough to reconstruct the sequence of events
WhatWhich entity, which record, which field
Old valueWhat it was before the change
New valueWhat it became after the change

Without old-and-new value pairs, you know something changed but not what. That's the equivalent of a security camera that records timestamps but not footage.

Three scenarios where the audit trail saves you

1. The regulator shows up

SOX, GDPR, Basel III — they all require demonstrable control over data that feeds financial reporting. When the auditor asks "show me every change to your cost center hierarchy in the last 12 months," you either pull up a filtered view that answers the question in two minutes, or you spend three weeks reconstructing changes from backup tapes and email threads.

I've seen the second version play out. An external audit that should have taken five days stretched to five weeks because nobody could prove who authorized a chart-of-accounts restructuring that happened eight months earlier. The change was correct. Proving it was authorized cost more than the restructuring itself.

2. The numbers suddenly break

Monday morning, the CFO's dashboard shows revenue down 12% in the Nordics region. The BI team checks — no ETL failures, no source system outages. Everything loaded correctly. It just loaded the wrong data. Someone reclassified three Norwegian subsidiaries under "Western Europe" on Friday afternoon. The regional hierarchy changed, and every report that rolls up by region now produces different numbers.

With an audit trail, you search for changes to the region hierarchy in the last 72 hours and find the culprit in seconds. Without one, you're comparing Friday's backup to Monday's database, diff-ing thousands of rows, hoping to spot what moved.

3. The fraud attempt

Supplier bank account fraud is not hypothetical. A 2024 AFP survey found that 80% of organizations experienced attempted or actual payment fraud. The most common vector: changing the bank details on an existing supplier record and waiting for the next automated payment run.

An audit trail alone doesn't prevent this — that's what approval workflows are for. But the audit trail makes the attempt visible. When someone changes a bank account, that event is recorded with the user's identity and the previous value. A weekly review of sensitive field changes catches the pattern before the payment runs.

What good audit logging looks like

The difference between a useful audit trail and a useless one isn't the volume of data captured. It's whether you can ask questions in plain language and get answers fast.

"Who changed this record?"

Without MDM

Check the transaction log

With audit trail

Click the record, open audit drawer, see full history

"What was the old value?"

Without MDM

Restore last night's backup and compare

With audit trail

Old and new value shown inline for every change

"Show all changes to suppliers this month"

Without MDM

Write a custom query against CDC tables

With audit trail

Filter audit log by entity and date range

"Did this change go through approval?"

Without MDM

Check someone's email inbox

With audit trail

Approval status and approver name in the audit record

The audit trail you ignore is the one that bites you

Most organizations implement audit logging and then never build the habit of reviewing it. The data accumulates in a table nobody queries. It becomes a form of organizational insurance — technically present, practically unused.

That changes the first time something goes wrong and the audit trail answers a question that would otherwise have taken weeks. After that, people start looking. They set up weekly reviews of sensitive field changes. They flag patterns — the same user making bulk changes outside business hours, bank details modified without a corresponding purchase order. The audit trail shifts from a compliance artifact to an operational tool.

You don't appreciate the fire alarm until the building smells like smoke.

Common questions

Why do you need an audit trail for master data?

Master data changes propagate to every downstream system — ERP, BI, data warehouse, integrations. A single unauthorized change to a supplier bank account or a product classification can affect invoices, financial reports, and regulatory filings. An audit trail records who changed what, when, and what the previous value was, making it possible to trace the root cause of any data issue and prove compliance to auditors.

What should a master data audit trail capture?

A useful audit trail captures five things: the user who made the change, the exact timestamp, the field that changed, the old value, and the new value. Without old-and-new value pairs, you know something changed but not what — which is nearly useless for debugging or compliance. Some systems also capture the reason for the change (via approval workflow comments) and the IP address or session ID.

How does Primentra handle audit logging?

Primentra logs every field-level change automatically — no configuration needed. Each audit record includes the user, timestamp, entity, record, attribute, old value, and new value. The audit drawer shows the complete history for any individual record. Bulk operations (imports, purges) are logged as single events with row counts. Approval workflow actions (submit, approve, reject) are also captured in the audit trail.

Is a database transaction log the same as an audit trail?

No. A database transaction log records physical changes at the storage level — page writes, index updates, row modifications. It is designed for crash recovery, not for business users. An audit trail records logical changes at the application level — "User X changed Customer Y's address from A to B at 14:32 on March 5." Transaction logs cannot tell you who made a change or what the business context was.

Want an audit trail that actually works?

Primentra logs every field-level change automatically — who, when, old value, new value. Pair it with approval workflows for sensitive fields and you get both prevention and traceability. Runs on SQL Server, deploys in a day. The 60-day trial includes everything.

Start free trial →Try the demo →

More from the blog

Master data without an audit trail is a liability8 min readModels, Entities & Attributes: How Primentra Organizes Your Master Data8 min readSupplier master data management: what it includes, what breaks without it, and where to start9 min read

Ready to migrate from Microsoft MDS?

Join the waitlist and be the first to try Primentra. All features included.

Download Free TrialTry DemoCompare MDM tools