When this is high fit
- Audit prep pressure with short deadlines.
- Need repeatable technical evidence snapshots.
- Need a transparent controls gap and unknowns baseline.
Compliance path
This path is for Security and GRC leaders who need technical-domain control mapping with traceability and explicit confidence boundaries. Outputs are evidence-aid, not certification.
Public pages show capability and proof-of-method. Full control-level target artifacts are delivered in scoped, NDA-first engagements.
Delivery model
Core framework baseline
This baseline is product capability from a deterministic self-scan on 2026-02-15. It is not a target-company result, certification, or legal opinion.
| Framework | Artifact | Score | Full/Partial/Gap | Out of Scope |
|---|---|---|---|---|
| PCI DSS 4.0 | pci-controls.json | 100% | 9/0/0 | 0 |
| ISO 27001 Annex A (technical) | iso27001-controls.json | 100% | 9/0/0 | 0 |
| NIST CSF 2.0 (technical mapping) | nist-csf-controls.json | 100% | 7/0/0 | 0 |
| GDPR Art. 25/30/32/33 | gdpr-safeguards.json | 100% | 6/0/0 | 0 |
Source contract: tools/sotlint/docs/CAPABILITIES_SCORECARD.md.
Visual examples
Visual prioritization of folder-level risk from this specific run.
Maps high-risk folders to controls and framework summaries for the scanned target.
Proof and verification
Choose execution model when requesting scope: