Multi-Framework Evidence Graph — One Evidence, Many Frameworks

Multi-Framework Evidence Graph — One Evidence, Many Frameworks

Challenge

Compliance teams managing multiple frameworks (SOC 2, PCI DSS, ISO 27001, DORA, NIS2, AI Act) collect redundant evidence for overlapping controls. A single penetration test report might satisfy requirements in 4 different frameworks, but each auditor receives a separate package. Manual mapping is error-prone, and proving evidence integrity during audits requires custom tooling.

Build an evidence repository where one artifact maps to multiple frameworks, with cryptographic integrity proofs and OSCAL-compliant audit package generation.

Solution Architecture

Overview

┌─────────────────────────────────────────────────────────────────┐
│                     Evidence Upload                              │
│         Pentest report · Policy doc · Screenshot · Log          │
└───────────────────────────┬─────────────────────────────────────┘
                            │
                            ▼
┌─────────────────────────────────────────────────────────────────┐
│                   Mapping Engine                                 │
│       NLP-assisted control suggestion + human confirmation      │
└───────────────────────────┬─────────────────────────────────────┘
                            │
         ┌──────────────────┴──────────────────┐
         ▼                                     ▼
┌──────────────────────┐          ┌──────────────────────┐
│   Control Library    │          │   Merkle Tree        │
│   500+ controls      │          │   Integrity Graph    │
│   6 frameworks       │          │                      │
└──────────────────────┘          └──────────────────────┘
                            │
                            ▼
┌─────────────────────────────────────────────────────────────────┐
│                    OSCAL Exporter                                │
│   Catalog · Profile · Component-Definition · SSP · AR           │
└───────────────────────────┬─────────────────────────────────────┘
                            │ Sigstore cosign
                            ▼
                 ┌──────────────────┐
                 │  Signed Audit    │
                 │    Package       │
                 └──────────────────┘

Control Mapping Example

One penetration test report satisfies:

FrameworkControl IDRequirement
PCI DSS 4.011.3.1External penetration testing
SOC 2CC7.1Security testing
ISO 27001A.12.6.1Technical vulnerability management
DORAArt. 24ICT resilience testing
NIS2Art. 21(2)(e)Security testing

Result: 5 audit requirements satisfied with 1 evidence artifact.

Key Features

1. Evidence Upload with Auto-Tagging

# Upload evidence with automatic control suggestion
evidence = repository.upload(
    file="pentest-report-2026-q1.pdf",
    title="Q1 External Penetration Test",
    date="2026-03-15",
    provider="SecureAudit Inc."
)

# NLP suggests applicable controls
suggestions = mapping_engine.suggest_controls(evidence)
# Returns: [PCI-11.3.1, SOC2-CC7.1, ISO-A.12.6.1, DORA-Art24, NIS2-Art21.2.e]

2. Merkle Tree Integrity

                    [Root Hash]
                    /          \
            [Hash AB]          [Hash CD]
            /      \            /      \
        [Hash A]  [Hash B]  [Hash C]  [Hash D]
           |         |         |         |
        Pentest   Policy    Config    Access
        Report    Doc       Backup    Review
  • Tamper-evident: Any modification invalidates the tree
  • Partial verification: Prove single evidence without revealing others
  • Audit trail: Every mapping change creates new tree version

3. OSCAL Export Suite

OSCAL ModelContent
CatalogAll 500+ controls from 6 frameworks
ProfileFramework-specific control selection
Component-DefinitionSystem components with implemented controls
SSPSystem Security Plan with evidence mapping
Assessment ResultsAudit findings with evidence links

4. Compliance Matrix Dashboard

┌─────────────────────────────────────────────────────────────┐
│                 Compliance Coverage Matrix                   │
├──────────┬─────────┬─────────┬─────────┬─────────┬─────────┤
│ Control  │ PCI DSS │  SOC 2  │ISO 27001│  DORA   │  NIS2   │
├──────────┼─────────┼─────────┼─────────┼─────────┼─────────┤
│ Access   │  ████   │  ████   │  ███░   │  ████   │  ██░░   │
│ Encrypt  │  ████   │  ███░   │  ████   │  ██░░   │  ███░   │
│ Testing  │  ████   │  ████   │  ████   │  ████   │  ████   │
│ Incident │  ███░   │  ██░░   │  ███░   │  ████   │  ████   │
└──────────┴─────────┴─────────┴─────────┴─────────┴─────────┘
  Coverage: ████ 100%  ███░ 75%  ██░░ 50%  █░░░ 25%

Tech Stack

ComponentTechnologyPurpose
API ServiceFastAPIEvidence CRUD + OSCAL export
Mapping EnginePython + NLPControl suggestion
OSCAL ServicePython + OSCAL librariesStandards-compliant export
Evidence StoreS3 WORM + Object LockImmutable artifact storage
DatabasePostgreSQL 16Control library, mappings
Dashboard UIReact 18 + TypeScriptCompliance matrix
SigningSigstore cosign keylessAudit package signatures

Supported Frameworks

FrameworkControlsStatus
SOC 2 Type II64Full
PCI DSS 4.0270+Full
ISO 27001:202293Full
DORA45Full
NIS230Full
EU AI Act25Full

Total: 500+ controls with cross-framework mapping

Results & Metrics

Evidence Reduction

Before: 5 frameworks × 50 evidence artifacts = 250 files
After:  ~80 unique artifacts mapped to all frameworks
Reduction: 68% fewer files to manage

Audit Prep Time

Traditional manual mapping: 40-80 hours per framework
With Evidence Graph:        8-16 hours per framework
Savings: 60-80%

Revenue Target

  • $100K Year 1 (SaaS + enterprise licenses)
  • Per-framework or organization-wide pricing

Architecture Decisions

  • Merkle tree over simple hashing: Enables partial proofs, efficient updates
  • OSCAL as export format: Industry standard, auditor-friendly
  • Sigstore keyless signing: No PKI infrastructure required
  • S3 WORM over database BLOBs: Meets retention requirements, cost-effective
  • NLP-assisted mapping: Reduces manual work, human confirms suggestions