Documentation Index
Fetch the complete documentation index at: https://docs.matproof.com/llms.txt
Use this file to discover all available pages before exploring further.
Onboarding
This guide covers what happens after you sign up at app.matproof.com: the setup wizard you go through, what the dashboard looks like at the end of it, and the recommended first week of work to get your first compliance score moving.What happens at signup
When you sign up, your organization is created with full Professional access for a 14-day trial. You can use every feature; no credit card up front. A banner in the app counts the days remaining. Four actions are gated until a card is on file or you upgrade: exporting compliance reports as PDF, running a penetration test scan, inviting team members, and connecting integrations. Everything else — frameworks, policies, controls, evidence, vendor management, AI policy editor, custom frameworks — works immediately. After the trial:- If a card is on file → you continue on Professional
- If no card → access is paused (no data lost; you can upgrade and resume any time)
The setup wizard
Right after signup, the app routes you to/setup and walks you through a guided wizard. The wizard’s job is to learn enough about your organization to (a) preselect the right controls per framework, (b) generate policies in the right tone and language, and (c) preconfigure your risk register with categories that make sense for your shape of business.
The wizard has roughly 18 steps, but they fall into four logical groups. Plan for 20–30 minutes end-to-end; you can save and resume at any point.
Group 1: Organization basics
- Organization name — what appears on generated reports and notifications
- Website — used for AI-aided industry classification and to seed the trust portal
- Description — a few sentences about what your organization does (informs AI-generated policy tone)
- Industry — drives risk-category presets and framework recommendations
- Team size — informs control proportionality (small org = lighter formality)
- Geographic scope — countries you operate in or sell to (drives jurisdictional add-ons like NIS2 transposition)
- Work location pattern — remote / hybrid / on-site (changes which device and access controls are relevant)
Group 2: Compliance scope
- Frameworks — pick one or more from the 16 built-in frameworks (DORA, NIS2, GDPR, ISO 27001, SOC 2, EU AI Act, etc.). You can also create Custom Frameworks later for national transpositions or industry standards.
- Infrastructure — where you host (AWS, Azure, GCP, on-prem, hybrid). Drives cloud-evidence integration recommendations.
- Software stack — what tools you use (productivity suite, IdP, source control, ticketing). Drives integration recommendations.
- Authentication — how your team logs into systems (SSO yes/no, MFA enforcement). Pre-fills relevant access controls.
- Devices — what kinds of devices people use (corporate Macs, BYOD, mobile). Drives device-agent relevance and BYOD policy generation.
- Data types — what categories of data you process (personal data, payment cards, health data, AI training data, etc.). Drives GDPR/PCI/HIPAA/AI Act applicability.
- Shipping — whether you ship physical products. Affects supply-chain controls (CSRD, supply-chain due diligence).
Group 3: People & accountability
- C-suite roster — who holds CISO / CTO / DPO / CCO / CEO accountabilities (used to prefill “responsible person” fields throughout the program)
- Report signatory — who signs off on audit-ready reports
Group 4: Policy preferences
- Policy language — which language to generate baseline policies in (German, English, French, Spanish, Italian, Dutch). You can also opt in to “also generate English” so you have parallel EN versions for international audits.
- Legal acknowledgment — confirm you accept the Terms of Service and DPA
/[orgId]/frameworks.
Your first week — day by day
The wizard gets you to a populated workspace. The first week of actual work turns that into a moving compliance score.Day 1 — Review what was generated
From the Frameworks dashboard, click into your primary framework. Skim the controls list and the AI-generated policy library. Reject anything that doesn’t fit; edit anything that’s close but not right. Don’t try to perfect everything — just calibrate the AI’s tone for your organization on 2–3 policies.Where to be:
/[orgId]/frameworks → click your framework → review controls and policies tabs.Day 1–2 — Invite your team and assign control owners
Compliance work fails without ownership. Go to People and invite each person who will own at least one control. Pick from the five built-in roles:
- Owner — everything including billing
- Admin — manages frameworks, evidence, vendors, team (no billing)
- Auditor — read-only; perfect for external auditors
- Employee — submits evidence and completes assigned tasks
- Contractor — same as Employee, flagged separately for audit reporting
/[orgId]/people to invite, then /[orgId]/frameworks/[id]/controls to assign.Day 2–3 — Connect your highest-impact integration
One well-chosen integration replaces dozens of manual evidence uploads. Start with the integration that covers the most controls in your framework selection:
Where to be:
| If you primarily run on… | Connect first |
|---|---|
| Cloud (AWS / Azure / GCP) | The relevant cloud connector |
| Google Workspace or Microsoft 365 | Your IdP integration |
| GitHub / GitLab for the engineering org | Your source-control integration |
/[orgId]/integrations → pick one → follow the OAuth flow.After connection, Matproof scans the connected system, populates evidence on the controls it covers, and surfaces any gaps as findings.Day 3–4 — Publish your top policies
Go through the auto-generated policy library and publish the 5–10 highest-priority policies (information security, access control, incident response, BCP, vendor management). For each:
- Read it, edit anything wrong, save.
- Set a review date (typically annual).
- Assign a policy owner.
- Click Publish — published policies become available for team acknowledgement and for control evidence.
/[orgId]/policies → open each → edit → publish.Day 4–5 — Run your first risk assessment
With frameworks selected and policies in place, walk through the risk register:
- Open
/[orgId]/risks(or whatever the risks route is in your sidebar). - Work through the preseeded risk categories — Matproof has scoped them to your industry and data types.
- For each risk, score likelihood and impact, set treatment (accept / mitigate / transfer / avoid), assign an owner.
- Link risks to the controls that mitigate them — this closes the loop between policies, controls, and risk.
Day 5+ — Start collecting manual evidence on the gaps
After steps 1–5 you’ll have a real compliance score with visible gaps. Go to Findings to see them in one list, sort by severity, assign owners, and close them out one at a time. Many gaps are closed with a single document upload (existing security training, BCP test results, prior pen-test reports).Where to be:
/[orgId]/findings → filter by status: open → close from highest severity down.After the first week
By the end of week one, a typical first-time customer has:- Setup wizard complete, baseline policies generated
- 5–10 policies published with owners and review dates
- 1–2 integrations connected, automated evidence flowing for ~30–50% of controls
- Team invited and at least one control owner assigned per high-priority control
- Risk register reviewed, top 10 risks scored
- First batch of findings triaged
Recommended order of operations
If you remember nothing else from this guide:What’s next
Compliance Frameworks
Understand how controls map across frameworks
Policy Management
Customize and publish your generated policy library
Custom Frameworks
Build your own frameworks for transpositions or industry standards
Findings
Track and close gaps across every framework