โ† ventsislava.com Compliance Evidence Collector
SOC 2
PORTFOLIO PROJECT
SYSTEM STATUS: ACTIVE

Compliance Evidence
Collector

Automated SOC 2 evidence collection from Identity, GitHub, and AWS sources. Evaluates findings against YAML-defined controls and generates audit-ready reports.

How it works

Click any component to see implementation details.

๐Ÿ”Œ
API Sources
Okta ยท GitHub ยท AWS
Source Connectors
Each source has a dedicated connector module with collect_evidence(). Uses bearer token auth, handles pagination, and normalizes output into a standard evidence dict.
โ†’
๐Ÿ“‹
YAML Controls
soc2_controls.yaml
Compliance-as-Code
Controls are defined in YAML โ€” no code changes needed to add new checks. Each control specifies: check_field, operator, threshold, and severity.
โ†’
โš™๏ธ
Evaluator
PASS ยท WARN ยท FAIL
Evaluation Engine
Compares evidence values against thresholds using safe operator lookup (no eval()). Three-tier result: PASS โ†’ WARNING โ†’ FAIL with human-readable messages.
โ†’
๐Ÿ“Š
Reports
JSON ยท CSV
Audit-Ready Output
Structured reports with control ID, status, severity, actual values, and thresholds. Exportable as JSON for automation or CSV for spreadsheet review.

Select a scenario and collect evidence

SCENARIO:
๐Ÿ”
Identity Provider
Simulated Okta-style identity data: MFA enrollment, inactive accounts, admin access reviews.
CC6.1CC6.2 CC6.3CC6.6
๐Ÿ™
GitHub
Repository security: branch protection, PR review requirements, secret scanning coverage.
CC8.1CC8.1.2 CC8.1.3
โ˜๏ธ
AWS
Cloud infrastructure: CloudTrail logging, encryption at rest, root account MFA enforcement.
CC7.1CC7.2 CC7.3
compliance-evidence-collector
Control Name Status Severity Details

Compliance-as-Code

Controls are defined in YAML โ€” add new checks without touching code.

Code Walkthrough