Give ControlFrame the approved sources, then let framework-specific agents collect mapped evidence.
Connectors define what the runner can access, where credentials live, which artifacts are allowed, and how every output maps back to native framework identifiers.
Connector definitions
Application target
Registers the audited application base URL, allowed domains, collection window, and environment classification before any browser run starts.
Browser personas
Maps framework-required user roles to managed browser sessions, test accounts, MFA instructions, and approval gates.
API functional source
Runs framework-specific API calls, captures request/response metadata, redacts sensitive payload fields, and maps output to native requirement IDs.
Identity provider
Collects configuration evidence for login, MFA, role assignment, account lifecycle, and identity proofing flows.
GRC and document corpus
Pulls policies, procedures, tickets, screenshots, exports, and prior-audit artifacts into evidence review queues for human approval.
Minimum artifact contract for auditor traceability
Names the audit framework without replacing the native control ID.
Stores the CMS, PCI, SOC 2, HIPAA, NIST, or other source-native identifier.
Links evidence to the official toolkit, workbook, control catalog, or licensed source.
Connects each artifact to the exact validation, dry-run, or collection execution.
Identifies the user role, system account, API client, or manual evidence owner.
Classifies screenshots, browser traces, extracted text, API JSON, checksums, or manual files.
Prevents raw sensitive evidence from becoming auditor-ready before review.
Tracks whether the artifact can be included in an auditor-ready package.