SaaS control plane, private evidence runtime, and on-prem appliance.
ControlFrame should not be only a cloud GRC app. The optimal architecture is a web control plane plus customer-controlled collector runtimes for regulated systems, local browser evidence, local redaction, and approved package transfer.
Keep one platform, ship multiple deployment envelopes
Company, framework, project, review, and audit-room workflows.
Browser/API/config collectors run inside the customer boundary.
Raw evidence can stay local until approved for export.
Only signed, redacted, approved bundles cross the boundary.
SaaS control plane
Hosted ControlFrame app for company onboarding, framework programs, evidence graph, review, package generation, and auditor rooms.
Evidence metadata and approved artifacts live in ControlFrame cloud. Connectors use least-privilege OAuth/API scopes.
Customer private cloud
Single-tenant ControlFrame deployment in the customer cloud or dedicated Locked In Labs-managed tenant with isolated storage and keys.
Customer controls network, storage region, encryption keys, service accounts, and artifact retention policy.
On-prem evidence appliance
A VM/Kubernetes/Docker appliance installed inside the corporate network, running collectors outbound-only with optional offline package transfer.
Raw screenshots, traces, and extracted text stay local unless explicitly approved for export. Jobs can be signed and pulled outbound over HTTPS.
Desktop / field runner
Local desktop runner for consultant-led or assessor-assisted browser evidence collection when a full appliance is not necessary.
Credentials and browser state remain on the operator machine. Evidence is staged locally until reviewed.
Air-gapped package transfer
Offline evidence package mode for environments where only signed manifests and approved bundles can cross the boundary.
Only signed, hashed, reviewer-approved packages leave the enclave by manual transfer.
Architecture components
Control plane
Company profiles, framework templates, projects, reviewer queues, package status, and auditor rooms.
Private collector runtime
Runs browser/API/config/document collectors near the target systems with local redaction and vault-backed credentials.
Agent swarm
Plans collection, classifies evidence, reviews sufficiency, drafts narratives, and proposes fixes behind human approval gates.
Connector SDK
Lets customers and partners push custom system evidence into typed framework-native evidence contracts.
Security evidence lane
Ingests vulnerability, pentest, cloud security, code scanning, and remediation proof as audit evidence without turning ControlFrame into a scanner first.