Signal-to-evidence platform

The gap between operational truth and audit-ready evidence

Scan any domain. See what an auditor sees — DNS, email, TLS, and security headers in seconds.

The problem

You already run compliance seriously

The hard part isn't controls — it's proving they work. The gap between operational reality and compliance representation is where risk hides.

Reconciliation

Signals live in 5 systems, evidence lives in a spreadsheet. Every audit cycle starts with manual reconstruction.

Transformation

Raw config state doesn't speak auditor language. Someone has to translate operational truth into control-mapped evidence.

Regression

A passing control last quarter doesn't mean it passes today. Without continuous checks, drift goes unnoticed until audit day.

Temporal proof

"What was true on audit day" is a manual reconstruction. Point-in-time defensibility requires a ledger, not a dashboard.

How it works

Double-entry compliance accounting

Like financial ledgers: every control is a credit, every finding is a debit. Your balance is your posture — at any point in time, auditable by design.

01

Collect

Scanners pull technical signals from DNS, headers, TLS, and vendor APIs. No agents, no footprint on your systems.

02

Transform

Signals become evidence, automatically mapped to ISO 27002, NIS2, SOC 2, DORA, and more frameworks simultaneously.

03

Record

Every state change is journaled. Not a dashboard snapshot — a ledger entry with lineage. Credits for controls, debits for findings.

04

Enforce

Policies detect regression, freshness decay, and coverage gaps. Waivers are time-bound. Nothing slips through unnoticed.

Signal sources

GitHubGitHub
SlackSlack
Google WorkspaceGoogle Workspace
GitLabGitLab
BitbucketBitbucket
Microsoft AzureMicrosoft Azure
NotionNotion
JiraJira
VercelVercel
LinearLinear
SupabaseSupabase
AWSAWS
Google CloudGoogle Cloud

Reconciliation

Does reality match the policy?

Every ISMS has policies. The hard part is proving they're enforced. Sudory maps what the policy requires to what the systems actually do — continuously.

Reconciled

"Email must be protected against spoofing"

DMARC set to reject
SPF record valid
DKIM signatures verified

ISO 27002 — 5.14 Information transfer

Reconciled

"Data in transit must be encrypted"

TLS 1.3 negotiated
HSTS header present
CAA restricts certificate issuance

ISO 27002 — 8.24 Cryptography

Evidence gap

"Applications must restrict content execution"

No Content-Security-Policy header
X-Frame-Options present
X-Content-Type-Options set

ISO 27002 — 8.28 Secure coding

Evidence gap

"DNS zones must be integrity-protected"

DNSSEC not enabled
NS records resolve correctly
IPv6 AAAA records present

ISO 27002 — 8.20 Network security

2 of 4 policies fully reconciled — 2 have evidence gaps requiring action

Policy-as-Code

Compliance rules that enforce themselves

Define what "good" looks like. Every scan is evaluated against your policies automatically. Drift is caught in minutes, not quarters.

Versioned and auditable

Policies live in code. Every change is tracked with who changed what and when. Auditors see the exact rules that were enforced at any point in time.

Policy history

v2.4Add CSP header requirementA. MüllerMar 12, 2026
v2.3Increase TLS minimum to 1.2A. MüllerFeb 28, 2026
v2.2Require DMARC reject policyL. WeberJan 15, 2026

Multi-framework mapping

One policy can satisfy controls across ISO 27002, NIS2, SOC 2, and more. Write once, comply everywhere.

DMARC reject policy

DMARC set to rejectPass

Satisfies

5.14Information transfer8.24Cryptography
ISO 27002NIS2SOC 2

Waivers with expiry dates

Exceptions are time-bound and approved. When they lapse, enforcement resumes automatically. No forgotten risks.

Active waiver

TLS minimum versionWaived
ReasonVendor migration in progress
Approved byciso@company.com
ExpiresJun 1, 2026

80 days remaining — then enforcement resumes

Coverage

What a single DNS scan proves

One scan maps to 6 ISO 27002:2022 controls across 7 frameworks.

5.14 Information transfer

SPF, DKIM, DMARC

8.9 Configuration management

DNS + HTTP header configs

8.20 Network security

DNSSEC, IPv6, NS records

8.21 Network services

TLS, HSTS, DANE

8.24 Cryptography

TLS, DNSSEC, DKIM keys, CAA

8.28 Secure coding

CSP, CSRF, cookie flags, X-Frame

ISO 27001ISO 27002NIS2GDPRDORASOC 2EAACIS BenchmarksAI Act

Questions

Everything you need to know

Next step

See what your evidence chain looks like

We're not assuming there's a major gap. Let's find out together where signal-to-evidence conversion can become less manual.

Contact