Partner Resources
If you are representing one of our partners, please log into your account to access hidden resources or request an invitation to sign up for the account.
In the context of TG, Chain-of-Custody is a single, verifiable record that starts with authorization, follows execution across cloud boundaries, and ends with integrity verification and attestation. It establishes the specific control and handling of a single object instance from ingest to destination.
The "chain-of-custody" for an object is defined by these seven mandatory pillars:
Instead of a per-transfer approval, the record references the pre-granted cloud permissions under which the transfer was executed.
TG identifies the "ingest" state by capturing the precise instance of the object, not just its name.
This connects the static object identity to the active transfer process.
Upon completion, TG records the "landed" state of the object.
A definitive record of the "Triple-Lock" hash comparison:
This addresses your "Semantic Versioning" policy for same-named objects.
The final terminal state of the chain-of-custody is the Signed Transfer Manifest.
If you are representing one of our partners, please log into your account to access hidden resources or request an invitation to sign up for the account.