Procurement • Audit
Controls Explorer — map control language to evidence pointers.
Search across SOC 2 / ISO 27001 / NIST CSF and OWASP GenAI mapping. Copy evidence pointers into tickets, export filtered CSV, and verify offline.
Fail‑closed
Missing/unverifiable ⇒ HOLD
No uploads
Same‑origin only
Explorer
Data source: the published mapping CSVs (same‑origin). This is an illustrative mapping; your auditor defines scope and applicability.
Deterministic outputs: PASS (verifies) • HOLD (missing/unverifiable) • FAIL (mismatch/tamper).
This tooling runs entirely in‑browser and fetches only same‑origin CSV.