Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.matproof.com/llms.txt

Use this file to discover all available pages before exploring further.

Evidence Collection

Evidence proves a control is implemented and working. In Matproof, every control has an evidence panel that pulls from four different sources:
SourceWhat it covers
IntegrationsCloud, identity, source-control, ticketing systems — automated
Device AgentEndpoint compliance signals from each user’s machine — automated
Cloud TestsContinuous configuration checks against AWS / Azure / GCP — automated
Penetration testsAI-powered or third-party pen-test reports — semi-automated
Manual uploadAny document, screenshot, or report that an integration can’t capture
This page covers how each source works and when to use which.

Automated: integrations

Connect tools you already use and Matproof scans them on a schedule, populating evidence on every control they cover.
IntegrationEvidence collectedControls typically covered
GitHub / GitLab / BitbucketBranch protection rules, PR review requirements, signed-commits policy, access logs, secret scanning statusChange management, secure SDLC, source-code access
Google WorkspaceUser list, role assignments, MFA enforcement, admin audit logs, group membershipsIdentity & access, awareness training
Microsoft Entra ID (Azure AD)Conditional access policies, MFA enforcement, admin role assignments, sign-in logsIdentity & access
AWSIAM policies, encryption-at-rest configuration, CloudTrail logging, S3 public-access settings, GuardDuty statusCryptography, access control, logging, threat detection
AzureRBAC assignments, encryption settings, Defender for Cloud findings, activity logsSame control families as AWS
GCPIAM policies, encryption settings, Security Command Center findingsSame control families as AWS
OktaUser lifecycle, MFA factors, app assignments, audit logsIdentity & access
Jira / LinearTicket data for incident records, change requests, approval workflowsIncident management, change management
Aikido SecurityVulnerability findings ingested as FindingsVulnerability management

Connecting an integration

1

Open Settings → Integrations

Go to Settings → Integrations. Each integration shows whether it’s currently connected and what it covers.
2

Click Connect

For OAuth integrations (Google Workspace, Okta, GitHub), you’ll be redirected to authorize Matproof on the third-party side and then back. For API-key integrations (AWS, some custom systems), paste credentials with the documented minimum permissions.
3

Wait for the first scan

The first scan typically takes 5–30 minutes depending on the size of the connected system. You’ll see evidence start appearing on relevant controls as the scan completes.
4

Set scan frequency

Default is daily. For high-velocity systems (e.g. GitHub on a fast-moving codebase), you can increase to hourly. Frequency setting is per integration.
Each integration is OAuth-scoped to the minimum read-only permissions needed. Matproof never writes to integrated systems unless you explicitly enable a write feature.

Automated: Device Agent

The Matproof Device Agent runs on each team member’s macOS or Windows machine and reports endpoint compliance signals every hour: disk encryption, screen lock, OS patch level, antivirus, firewall, MDM enrollment, plus a 6-hourly software inventory that’s matched against the NVD CVE database for vulnerable installed apps. Device-agent evidence flows to controls like:
  • ISO 27001 A.8.1 (User endpoint devices), A.8.7 (Protection against malware), A.8.8 (Management of technical vulnerabilities)
  • SOC 2 CC6.1, CC6.6, CC7.1
  • HIPAA 164.308, 164.310, 164.312
  • NIS2 Article 21(2)(d), 21(2)(g)
  • DORA Article 9
  • PCI DSS 6.3.1, 8.6.3
Roll out the agent to your team via People → [Member] → Devices → Send install link.

Automated: Cloud Tests

Cloud Tests run continuous configuration checks against your AWS / Azure / GCP environments — separate from the integration scan, focused on misconfigurations rather than identity. Failed checks produce findings; passing checks produce evidence.

Automated: Penetration Tests

Penetration Tests generates an AI-powered external pen-test report against a target URL on demand. The resulting findings flow into the Findings module; the report itself can be attached as evidence on annual-pen-test controls. For third-party penetration tests (when an external firm runs the test), upload the report manually as evidence on the relevant control.

Manual evidence upload

For controls that can’t be covered by an integration — internal procedures, BCP test results, board minutes, awareness-training screenshots, vendor SOC 2 reports — upload manually:
1

Open the control

Go to Controls (under whichever framework or via the unified controls list) and open the control you want to evidence.
2

Click Add evidence

Choose between Upload file (any format), Add link (URL to an external system), or Add note (text-only attestation).
3

Set metadata

  • Description — what this evidence demonstrates
  • Expiry date — when the evidence becomes stale (defaults are sensible per control type)
  • Owner — usually the person responsible for refreshing it
4

Save

Evidence appears immediately on the control. The control’s status updates if all required evidence is now in place.

Bulk upload

For initial setup or annual refreshes, upload many files at once:
  1. Go to Evidence → Bulk upload
  2. Download the evidence-mapping template (CSV)
  3. Fill in: filename, control IDs, description, expiry date
  4. Upload the ZIP containing both the template and the files
Matproof maps each file to its declared control(s) automatically.

Evidence expiry

Every piece of evidence has an expiry date. Matproof emails the evidence owner 30 days before expiry so there’s time to collect a refresh. Sensible defaults by evidence type:
Evidence typeDefault expiry
Access reviews6 months
Awareness training records12 months
Penetration test reports12 months
BCP / DR test results12 months
Vendor risk assessments12 months
Policy acknowledgements12 months
Cryptography algorithm review24 months
Risk assessment12 months
You can override per control. Audit framework requirements often dictate the expiry — Matproof picks the strictest default.

Evidence Review

Evidence isn’t useful unless someone checks it. The Evidence Review module gives compliance leads a workflow to approve, reject, or request more from each piece of evidence as it arrives. Auditors typically expect this review trail.

Controls

Where evidence attaches

Evidence Review

Approve and reject evidence as it arrives

Device Agent

Endpoint evidence

Cloud Tests

Continuous cloud configuration evidence