Skip to content
Silhouette of a manager exploring logistics innovations on a digital screen sleek office
Korbinian HermannMar 19, 2026 12:45:10 PM17 min read

Archive Access Without an IT Ticket: Access Models for Departments in Manufacturing and Production

Just imagine: A tax audit is due. The tax auditor needs production data from 2019. The system that recorded this data back then was replaced in 2022. The data is in the archive - somewhere. The quality team submits an IT ticket. IT opens the ticket, prioritizes, searches for the archive, exports, converts and sends back a CSV. Three days later.

This is not an exceptional case. It is part of everyday life in manufacturing companies that see their data archive as an IT task rather than a departmental resource. IT becomes a bottleneck - not out of malice, but because archive access is structurally organized incorrectly.

This article analyzes the four access models for production data archives, identifies the technical requirements for genuine self-service and shows which model makes sense for which use case in production.

THE MOST IMPORTANT FACTS IN BRIEF

  • There are four access models for data archives: IT-centralized, delegated, self-service and hybrid. In manufacturing companies, the IT-centralized model still dominates today - even though it is the most expensive and slowest.
  • The cost of an IT ticket for archive data is typically between €80 and €300 per request - including prioritization, processing, queries and post-processing. With 200-400 archive requests per year, this adds up to €30,000-80,000 in pure IT overhead.
  • Self-service archive access is not a security risk if it is implemented correctly: role-based access rights, an audit trail of every access and unchangeable archive data are the three technical requirements.
  • The biggest obstacle to departmental access to archive data is not a lack of tools - it is an organizational problem: who is allowed to see what, and who decides? Without a clear role matrix, any self-service initiative will fail.
  • The following applies to legacy system data: as long as the old system is misused as an 'archive access tool', it cannot be switched off. Self-service archive access is the prerequisite for complete application retirement.

BRIEFLY SUMMARIZED

  • IT as an archive bottleneck costs money, time and nerves - on both sides. Departments are waiting for data that belongs to them. IT processes tickets that do not generate any added value.

  • The goal is not to lose control: proper self-service means that departments access the data they need - with a complete audit trail and role-based access control.

  • Legacy systems are often only still running so that IT can handle access to archive data. This is one of the most expensive hidden IT costs in manufacturing.

 

The problem: IT as a structural archive bottleneck

The archive bottleneck is not a technical problem. It is an organizational problem caused by a wrong technical decision: Data archives are managed as IT systems, not as departmental resources. The consequence is a dependency chain in which every data request runs through IT.

 

What typical archive access looks like today

01

Request is created

Quality / Controlling / Sales

02

Create IT ticket

10-30 min. department

03

Prioritize ticket

1-3 working days waiting time

04

Search archive

1-4 hours IT

05

Export + conversion

30-120 min IT

06

Clarify queries

+1-2 days

07

Transfer data

Total duration: 3-7 days

Seven steps for a request that would be completed in 30 seconds in a well-structured archive solution. This is no exaggeration. It is the measurable reality in companies without self-service archive access.

 

What this bottleneck really costs

Task type

Tickets / year

IT effort (h)

Extrapolation of costs

Retrieve production data from legacy system

60-80

2-4 h

9,600-28,800 €/year

Batch verification for quality inspection

40-60

1-3 h

4,800-21,600 €/year

Document reconstruction for tax inspection

10-20

3-6 h

3,600-14,400 €/year

Archive data for customer complaints

30-50

1-2 h

3,600-12,000 €/year

Legacy system access for audit

20-30

4-8 h

9,600-28,800 €/year

Total overhead p.a.

approx. 40,000 - 70,000 € p.a. Opportunity Cost IT

WHAT ELSE THIS OVERHEAD COSTS - BEYOND THE MONEY
  • Delays in decision-making: Controlling waits 3 days for production data - and makes decisions based on incomplete information.

  • Audit stress: During audits, everyone runs to IT at the same time. This costs IT capacity precisely when it is most scarce.

  • Employee frustration: Departmental employees who have to open IT tickets for simple data retrieval systematically develop workaround strategies - shadow copies, local exports, email attachments.

  • Legacy system dependency: As long as IT handles archive access via the legacy system, the system cannot be switched off - even if it no longer fulfills any other functions.

3-7 days

Typical waiting time for archive access

CSP customer projects

80-300 €

Costs per IT archive ticket

Incl. IT overhead

65 %

IT tickets could be solved self-service

CSP analysis

0 min.

Waiting time with self-service archive

CHRONOS practice

 

 

A comparison of the four access models for data archives

MODEL 1

Status quo in most companies

IT-centralized access

All archive access is handled by IT. Departments submit tickets, IT searches, exports and transfers the data. The archive is an IT system with IT access logic.

✓ Advantages

  • Maximum control over all archive accesses
  • Standardized security and compliance logic
  • No training required for specialist departments

Disadvantages

  • IT becomes a bottleneck - every request costs IT time
  • Waiting times of days are standard, not an exception
  • Legacy systems cannot be switched off
  • Opportunity cost: IT capacity tied up in low-value tasks

Suitable for: Small IT organizations with few archive accesses p.a. Highly sensitive data without self-service capability.

Verdict : Works - but does not scale and is expensive.

MODEL 2

IT DELEGATES ACCESS TO KEY ROLES

Delegated access

Selected department employees ('key users', 'data stewards') receive direct archive access and serve as the first point of contact for their department. IT remains responsible for complex requests.

✓ Advantages

  • Relieves IT of routine requests (60-70% of tickets)
  • Department has experts with data knowledge
  • Low training costs - only key users need to be trained

✗ Disadvantages

  • New dependency arises: key users become an internal bottleneck
  • Loss of knowledge when key users leave the company
  • No complete self-service - only one level shifted

Suitable for: Medium-sized companies with defined specialist departments. Good intermediate step in the migration to self-service.

Verdict : Good compromise - but not the final solution.

MODEL 3

SPECIALIST DEPARTMENT ACCESSES DIRECTLY - WITHOUT IT

Self-service archive access

Every authorized department employee can directly access the archive data released for their role - via a simple interface, without a ticket, without waiting time. All accesses are fully logged.

✓ Advantages

  • Waiting time = 0 - data immediately available when needed
  • IT completely relieved of routine archive accesses
  • Enables complete application retirement of legacy systems
  • Complete audit trail of all accesses - often better than IT-centric model

Disadvantages

  • Higher implementation effort: role matrix and rights concept required
  • Archive solution must technically support self-service
  • Not suitable for all data: highly sensitive data requires IT control

Suitable for: Companies with a high archive access volume, clear role structures and the goal of switching off legacy systems.

Verdict : The target state for most production companies.

MODEL 4

SELF-SERVICE + IT CONTROL ACCORDING TO DATA SENSITIVITY

Hybrid access model

Archive data is classified according to sensitivity: Routine production data and quality data are accessible via self-service, highly sensitive data (personnel data, contract documents, financial data) remain IT-controlled.

✓ Advantages

  • Optimal cost-benefit ratio: 70-80% self-service, 20-30% IT-controlled
  • Risk-appropriate access control: high level of control where necessary, no control where unnecessary
  • Scales with the company - data categories can be adapted at any time

Disadvantages

  • More complex implementation: two access systems in parallel
  • Data categorization must be carried out in full initially

Suitable for: Large production companies with a heterogeneous database and different compliance requirements for each data type.

Verdict : Best practice for companies with 500 or more employees.

 

Role matrix: Who needs access to what in production?

The most frequent failure of self-service archive projects has a single reason: the role matrix was not created. Without a clear answer to the question "Who can see what?", self-service either remains a security risk or is implemented so restrictively that it adds no value.

The following matrix shows typical roles in production companies with the recommended archive access in each case.

Role / data type

Production logs

Batch records

Quality data

Financial accounting documents

Employee data

Supplier data

Quality manager

✓✓ Self-Serv.

✓✓ Self-Serv.

✓✓ Self-Serv.

○ Read access no.

-

○ Read access no.

Production manager

✓✓ Self-Serv.

✓✓ Self-Serv.

✓ restricted

-

-

○ Read access no.

Shift leader

○ Reading access no.

✓ restricted

-

-

-

-

Controlling

-

-

✓ restricted

✓✓ Self-serv.

-

-

Distribution/CS

-

-

✓ restricted

-

✓✓ Self-Serv.

-

HR department

-

-

-

-

✓✓ Self-Serv.

-

purchase

-

-

-

-

-

✓✓ Self-Serv.

Data protection officer

○ Read access no.

○ Read access no.

-

-

✓✓ Self-Serv.

-

External auditor (audit)

○ Read access no.

○ Read access no.

○ Read access no.

○ Read access no.

-

-

IT administrator

✓✓ Admin

✓✓✓ Admin

✓✓✓ Admin

✓✓✓ Admin

✓✓✓ Admin

✓✓✓ Admin

Legend:

✓✓ = Self-service unrestricted

✓ = Self-service with date limitation/project binding

○ = Read access with log entry

- = no direct access, IT ticket required

PRACTICAL TIP: HOW TO CREATE THE ROLE MATRIX

  • Step 1: Workshop with department heads - Which archive data do you need and how often? What for?

  • Step 2: Data categorization according to sensitivity (public / internal / confidential / strictly confidential)

  • Step 3: For each combination of role × data category: self-service, restricted access or IT ticket?

  • Step 4: Legal check - which accesses require data protection agreements (e.g. employee data)?

  • Step 5: Technical implementation in the archive solution - configure access rights according to role matrix

  • Experience: A complete workshop takes 2-4 hours. This saves years of IT tickets.

 

 

Five technical requirements for genuine self-service archive access

Self-service archive access is not a question of goodwill. It is a question of the technical foundations. If one of these five prerequisites is missing, self-service becomes a security or compliance risk - or simply cannot be used.

 

Prerequisite 1 - Open, manufacturer-independent archive format

Without this requirement

Departments can only open data if the original system is still running. Legacy system remains active - exclusively as an archive access tool.

With this requirement

Archive data is in an open, standardized format (e.g. CSV, XML, PDF/A) - readable with any standard tool, without special software or a running source system.

Why this counts:

This is the most common cause of forced legacy system runtimes: The system is no longer running for its function - but only so that someone can open the archive data.

 

Prerequisite 2 - Role-based access control (RBAC)

Without this prerequisite

Everyone sees everything or no one sees anything. IT refuses to introduce self-service because they have no differentiated control.

With this requirement

Each role has precisely defined read authorization to exactly the data categories it needs for its work. Other data does not technically exist for this role.

Why this matters:

Without RBAC, self-service archive access is a data protection breach in waiting. With RBAC, it is often more secure than IT-centralized access - because access is logged.

 

Requirement 3 - Complete audit trail of all accesses

Without this prerequisite

No one knows who has accessed which archive data and when. Compliance requirements cannot be met.

With this requirement

Every access to archive data is logged automatically and unalterably: Who, when, which data, for how long. The audit trail itself is audit-proof.

Why this counts:

Paradoxically, many companies do not have a complete audit trail in the IT-centric model - because IT accesses are often not logged individually internally. Self-service with logging is often more transparent.

 

Requirement 4 - Simple, browser-based search interface

Without this requirement

Department employees cannot technically find archive data - they do not know how to use the archive CLI. Self-service fails due to usability.

With this prerequisite

An intuitive search interface - comparable to an internal Google search - enables every department employee to find archive data by date, batch, order number or customer number.

Why this counts:

The technically best archive is worthless if the quality manager searches for 20 minutes and then opens an IT ticket after all. Usability is not an optional extra - it is the basic requirement for acceptance.

 

Requirement 5 - Export function for standard formats

Without this prerequisite

Department employees cannot transfer archive data to their working environment. Data can be found but cannot be used.

With this requirement

One-click export to Excel, PDF, CSV or XML - without IT involvement, without conversion effort. The department receives the data in the format it works with.

Why this counts:

The last mile of self-service is often forgotten: Finding data is good, being able to use data is the goal. Without a simple export, the ticket still ends up in IT.

 

Security and compliance for departmental access

The most common objection to self-service archive access comes from IT or the data protection officer: 'If everyone can access the archive, we lose control'. This objection is justified - but only if self-service is implemented incorrectly.

When implemented correctly, self-service archive access is often better than IT-centralized access from a security perspective. The reason: in the IT-centralized model, an IT employee accesses many data categories - and this access is not always logged individually. In the self-service model, each user only accesses their defined data categories - and each access is logged automatically.

Security aspect

IT-centralized model

Self-service model

Breadth of access

IT employee sees all data

Business department only sees approved categories

Logging

Often summarized: 'Ticket processed'

Fully automatic: who, what, when, how long

Risk of incorrect access

High: IT could provide incorrect data

Low: technically limited to permitted data

GDPR compliance

Dependent on IT discipline

Technically enforced by RBAC

Auditability

Medium: manual documentation

High: automatic, unchangeable trail

Response time in the event of a security incident

Slow: IT ticket for blocking

Immediate: Access rights can be revoked centrally

 

Legacy systems and archive access: The hidden dependency cycle

There is a structural reason why many legacy systems in production companies continue to be operated for years after their actual replacement: They serve as archive access tools. The function of the system is done - but without the system, no one can open the historical data.

This is a cycle: The legacy system is not shut down because you still need to access the data. The data is not migrated because the legacy system is still running. The legacy system costs licenses, maintenance, security patches and IT capacity - for a single function: archive access.

 

WHAT A LEGACY SYSTEM THAT CONTINUES TO RUN AS AN ARCHIVING TOOL REALLY COSTS

  • License costs: Outdated ERP systems, MES or quality software typically cost €20,000-80,000 p.a. in end-of-life phases - often for maintenance contracts without further development.

  • IT costs: Keeping a system alive means security patches, infrastructure, backup - even if it only has an archive function. Typically 0.2-0.5 FTE IT expenditure p.a.

  • Security risk: End-of-life systems are no longer supplied with updates. Every connection to the network is a potential gateway - just so someone can call up production data from 2017.

  • Knowledge dependency: who still knows how to use the old system? With every change of employee, the risk increases that no one can navigate the system.

The solution is not to continue operating the legacy system. The solution is to migrate the data to a manufacturer-independent, self-service-capable archive - then the system can be switched off.

The most expensive legacy systems in production companies are not those that are still in active use. They are the ones that only run so that someone can call up archive data once a month.

-Korbinian Hermann Managing Director, CSP Intelligence GmbH

 

 

CHRONOS: Self-service archive access for production data in practice

PRACTICAL TIP

CHRONOS – Self-Service Archive Access for Departments

CHRONOS offers a browser-based self-service interface for direct access to archived production data, quality data, and legacy system data—role-based, fully logged, and vendor-independent. Business units search for, find, and export archive data independently – no IT ticket, no waiting time.

  • Browser-based search interface – no training, no ticket, no waiting

  • RBAC: Each role sees only its approved data categories

  • Complete audit trail: Every access automatically and permanently logged

  • Open format: Oracle, SAP, MS SQL, CSV – all source data archived vendor-independently

  • Application retirement: Completely decommission legacy systems after data has been migrated

  • Export: Excel, PDF, CSV – directly from the archive, without IT involvement

Frequently asked questions

Is self-service archive access compatible with the GDPR?

Yes—if it is implemented correctly. The GDPR requires that access to personal data be limited to the minimum necessary (data minimization, Art. 5 GDPR) and be fully traceable (accountability, Art. 5(2)). Self-service archive access with role-based access control and a complete audit trail often meets these requirements better than IT-centralized access—because every access event is automatically documented.


Translated with DeepL.com (free version)

What types of archive data are not suitable for self-service?

Highly sensitive personal data—such as salary records, disciplinary proceedings, and health information—should generally not be accessible via self-service. The same applies to data subject to special confidentiality obligations (M&A documents, strategic planning data). For these categories, the hybrid model is recommended: routine production data via self-service, while sensitive categories remain under IT control.

How long does it take to implement self-service archive access?

Technical implementation typically takes 4–8 weeks. The most time-consuming part is the organizational preparation: creating a role matrix, categorizing data, and defining access rights. This workshop process takes 2–4 weeks. In practice, the biggest delay is not caused by technology—but by the question of who is internally responsible for access rights.

What happens to access to data from systems that have been shut down?

That is the key advantage of a vendor-neutral archive: Data from decommissioned systems is just as accessible as data from active systems. The department doesn’t notice any difference—it searches for, finds, and exports data regardless of which source system it comes from and whether that system is still running. Prerequisite: The data must have been fully migrated to the archive in an open format before the system was decommissioned.

Can external auditors (certified public accountants, tax auditors) be granted direct access to the archives?

Yes—and in practice, this results in a significant gain in efficiency. Instead of the auditor opening “Auditor needs data” tickets with IT, the auditor can be granted time-limited read access to the relevant data categories. All access is logged. At the end of the audit period, access is automatically revoked. Many CSP customers report that this has reduced the duration of tax audits from days to hours.

How can you prevent departments from modifying archive data?

Audit-proof archives are technically immutable—that is their fundamental characteristic. A departmental employee with read access can view and export data, but cannot modify it. Any attempt to access the data with write permissions is technically blocked and logged in the audit trail. This is what fundamentally distinguishes an archive from an active production system.

What is the difference between a data archive and a DMS (document management system)?

A DMS is optimized for active documents in ongoing processes: searching, editing, approval workflows, and collaboration. A data archive is optimized for inactive historical data: immutable long-term retention, compliance evidence, read-only access without editing capabilities. Many companies attempt to use DMS systems as archives—and fail due to the lack of immutability and insufficient compliance features.

How can the department locate data if it doesn't know the archive's internal structure?

That is the key usability question. A good self-service archive offers full-text search based on business terms, not on database structure. The quality manager searches for ‘Batch CH-2019-4471’—not for ‘Table QM_BATCH, Column BATCH_ID’. The archive solution translates business terms into technical queries. Without this abstraction layer, self-service remains a theoretical option that nobody uses in practice.

 

Know who is accessing which archive data.

Self-service archive for departments – role-based, fully logged, no IT ticket required

avatar
Korbinian Hermann
CEO, CSP Intelligence GmbH
Korbinian Hermann founded CSP with the aim of providing manufacturing companies with the database they need in an emergency. He has 20 years of experience in industrial quality data infrastructure—from data collection to audit-proof long-term archiving.
COMMENTS

RELATED ARTICLES