SW
Connector SDK

Give ControlFrame the approved sources, then let framework-specific agents collect mapped evidence.

Connectors define what the runner can access, where credentials live, which artifacts are allowed, and how every output maps back to native framework identifiers.

browserAPIGRCprivate runtime
Connector types
5
Application, persona, API, IdP, GRC
Framework reach
7
Seeded mappings use these connector patterns
Artifact fields
8
Minimum source-backed evidence schema
Private-capable
5
Can run inside customer boundary
Reusable access layer

Connector definitions

application urlconnector-application-target

Application target

Registers the audited application base URL, allowed domains, collection window, and environment classification before any browser run starts.

Inputs
base URL
allowed hostnames
environment label
collection approval window
redaction rules
Outputs
target manifest
host allowlist
run preflight record
network boundary note
Framework use
CMS EDE
PCI DSS
SOC 2
HIPAA
HITRUST
Secret handling: No application secrets are stored in the SaaS fixture. Private runtimes receive target metadata and resolve credentials locally.
browser personaconnector-browser-personas

Browser personas

Maps framework-required user roles to managed browser sessions, test accounts, MFA instructions, and approval gates.

Inputs
persona role
credential source
MFA path
test account approval
session reset policy
Outputs
browser trace
screenshot catalog
extracted page text
persona run log
blocked-login note
Framework use
CMS EDE
PCI DSS
SOC 2
HIPAA
NIST CSF
Secret handling: Credentials stay in local vaults, browser profiles, or one-time operator input. ControlFrame stores persona labels and run proof, not passwords.
api endpointconnector-api-functional

API functional source

Runs framework-specific API calls, captures request/response metadata, redacts sensitive payload fields, and maps output to native requirement IDs.

Inputs
endpoint collection
auth method
test payload set
expected response mapping
redaction policy
Outputs
request manifest
response JSON
schema validation result
checksum
source row index
Framework use
CMS EDE
PCI DSS
HIPAA
HITRUST
Secret handling: Bearer tokens, client secrets, and mTLS material are mounted only into the private runner process and never serialized to auditor packets.
identity providerconnector-identity-provider

Identity provider

Collects configuration evidence for login, MFA, role assignment, account lifecycle, and identity proofing flows.

Inputs
provider tenant
read-only admin scope
role mapping
MFA policy scope
export approval
Outputs
configuration snapshot
policy evidence
role inventory
identity-proofing blocker note
Framework use
CMS EDE
SOC 2
PCI DSS
HIPAA
NIST CSF
Secret handling: Read-only API tokens are stored in the customer runtime vault and can be rotated without changing framework mappings.
grc toolconnector-grc-docs

GRC and document corpus

Pulls policies, procedures, tickets, screenshots, exports, and prior-audit artifacts into evidence review queues for human approval.

Inputs
repository or GRC endpoint
collection scope
document labels
evidence owner
staleness threshold
Outputs
document inventory
policy freshness table
manual evidence requests
human approval trail
Framework use
SOC 2
PCI DSS
HIPAA
HITRUST
ISO 27001
Secret handling: Document connectors can run with OAuth, service accounts, local folder mounts, or offline package import depending on customer boundary.
Evidence schema

Minimum artifact contract for auditor traceability

requiredframeworkKey

Names the audit framework without replacing the native control ID.

requirednativeRequirementId

Stores the CMS, PCI, SOC 2, HIPAA, NIST, or other source-native identifier.

requiredsourceDocumentRef

Links evidence to the official toolkit, workbook, control catalog, or licensed source.

requiredcollectorRunId

Connects each artifact to the exact validation, dry-run, or collection execution.

optionalpersonaOrSystem

Identifies the user role, system account, API client, or manual evidence owner.

requiredartifactType

Classifies screenshots, browser traces, extracted text, API JSON, checksums, or manual files.

requiredredactionState

Prevents raw sensitive evidence from becoming auditor-ready before review.

requiredexportStatus

Tracks whether the artifact can be included in an auditor-ready package.