Compliance

Evidence-backed compliance mapping across frameworks and jurisdictions.

Frameworks

Supported compliance frameworks

EDD-i maps your independently captured evidence against multiple frameworks — showing not just what you say you do, but what your systems actually do.

CIS Controls

Center for Internet Security's prioritized set of actions for cyber defense. EDD-i maps evidence against all 18 control families with independent verification.

NIST CSF

The NIST Cybersecurity Framework's five core functions: Identify, Protect, Detect, Respond, Recover. EDD-i captures continuous evidence across each.

ISO 27001

International standard for information security management systems. EDD-i supports certification readiness with evidence-backed control mapping.

Regional Data Protection

GDPR, NDPA (Nigeria), POPIA, and other regional data protection laws. EDD-i maps evidence against jurisdiction-specific requirements.

SOC 2

Service Organization Control 2 trust service criteria. EDD-i's continuous evidence provides the ongoing proof that point-in-time audits miss.

FedRAMP

Federal Risk and Authorization Management Program. EDD-i supports evidence requirements for cloud service providers working with U.S. government agencies.

How it works

Evidence-backed, not self-attested

EDD-i continuously captures signals from your IT, security, and compliance environments, then maps those signals against your selected frameworks. The result is compliance evidence based on how your systems actually operate — not on screenshots, questionnaires, or self-reported controls.

Learn more
Compliance evidence

Ready to move beyond self-attestation?

See how EDD-i creates independent evidence for multi-framework compliance.