M5 • Compliance & Evidence
Produce audit-friendly, buyer-safe evidence: logging, retention, access controls, and export integrity.
Outcomes & timebox
- Explain the enterprise operating model for compliance & evidence
- Identify control points, owners, and escalation paths
- Define evidence outputs that satisfy enterprise review
- Produce a reusable artifact template for your Proof Pack
Read the tables, then complete the scenario + worksheet. Download the artifact to your delivery repo.
Core concepts
What “good” looks like
| Evidence type | What it proves | How collected | Retention | Red flags |
|---|---|---|---|---|
| RBAC export | Least privilege enforced | Scheduled export | Weekly/Monthly | PII leakage |
| Change approvals | Controlled releases | Ticket + approvals | 12–24 months | No rollback plan |
| Recon reports | State correctness | Daily job | 90–365 days | Unexplained diffs |
| Incident logs | Response maturity | Runbook + timeline | 12–24 months | No postmortems |
| Export integrity | No tampering | Hashes/signatures | As required | Missing checksums |
Turn each row into: owners → controls → monitoring → evidence.
Who owns what
Compliance owner
Security owner
Ops owner
Trust boundaries & controls
Boundaries you must control
Boundary A: Sensitive data → Evidence
Evidence must avoid PII and secrets.
Boundary B: Evidence → Buyer review
Evidence must be understandable.
Boundary C: Evidence → Retention
Retention must be provable.
Controls you must be able to prove
- Data classification (what can appear in evidence)
- Retention policy with ownership
- Export schedule + integrity checks (hash/signature)
- Access review cadence
- Audit trail for change + incidents
- Redaction rules for buyer-safe sharing
Evidence & proof artifacts
Add these to your Proof Pack
- Evidence Packet Checklist
- Retention Policy
- Control-to-Evidence Matrix
- Export Integrity Procedure
- Redaction Guidelines
Evidence rule
Downloadable artifact
Complete the worksheet below and download a Markdown file to your repo.
Mini case study
Buyer requests evidence for last quarter
A bank asks for last quarter’s evidence packet. Buyer asks: “How do you export it safely and prove integrity?”
- Evidence packet checklist scope
- Redaction / buyer-safe packaging
- Integrity hashes + signatures
- Retention retrieval proof
- Approval chain for release
Write 6–12 lines you could hand to an enterprise buyer.
Worksheet
Not statements — outputs
Every module produces an artifact: checklist, runbook section, control matrix, or proof pack component.
Measurable gates
Quizzes + capstone + exam. Completion is earned by passing gates.
Repeatable delivery
Templates, owners, SLAs, and evidence. That’s what closes enterprise deals.