SW
A Locked In Labs application · Program templates

One evidence engine, many audit frameworks.

ControlFrame starts with a company profile, selects framework programs, builds an audit project, connects collectors and agents, then packages source-backed evidence for auditors. CMS EDE is the first fully seeded showcase because it proves row-level, regulator-specific evidence.

Built for partner-assisted audit readiness without hardcoding any services partner into the product.

Framework programs
12
1 seeded, more templated next
Active projects
1
Audit/readiness engagements
Platform modules
8
7 in build lane
Showcase
CMS EDE
HPS / MarketLink audit-readiness
Operating spine

Company to audit-room flow

Evidence infrastructure

Make the audit ledger the center of the product

Enterprise buyers need to see the chain from source requirement to runner execution, review decision, and package release. This is the ControlFrame object that generic GRC tools do not make precise enough for regulated app audits.

01 / Framework owner

Source requirement

Keep the regulator, assessor, or framework-native row as the durable starting point.

CMS item, toolkit row, control, source chunk
02 / Compliance lead

Evidence plan

Translate the requirement into personas, target systems, credentials, expected artifacts, blockers, and gates.

Runnable plan with expected screenshots, JSON, logs, and reviewer criteria
03 / Runner operator

Private runner job

Claim a signed job inside the customer boundary and execute browser, API, document, or connector collection.

Job ledger, heartbeat, target URL, runtime trace
04 / Collector runtime

Collected artifact

Attach source lineage, role, timestamp, environment, checksum, and raw artifact metadata.

Screenshot, API request/response, JSON payload, document, system snapshot
05 / Evidence reviewer

Sufficiency review

Score completeness, freshness, persona fit, mapping strength, and redaction risk before export.

Reviewer decision, AI review log, defect list, redaction manifest
06 / Audit lead

Auditor package

Release only approved evidence into an auditor room with source indexes, comments, and package hashes.

Export manifest, source-row index, access log, package checksum
Framework registry

Programs are reusable templates, not one-off folders

CMS Enhanced Direct Enrollment
Year 9 / PY2026
active showcase

First seeded template. HPS / MarketLink is a sample project instance with placeholders until ControlFrame collectors run.

3
native IDs
4
collectors
9
seed rows
Application UI Toolkit UI Questions Item #6Partner Test Case Suite TC-01MARS-E AC-02
Open program template
Cybersecurity Maturity Model Certification
CMMC 2.0 / 32 CFR Part 170 and DFARS rollout
next seed

Defense-industrial-base template. Strong reason for private deployment, appliance collectors, and careful data-residency boundaries.

3
native IDs
4
collectors
5
seed rows
AC.L2-3.1.1IA.L2-3.5.3SI.L2-3.14.2
Open program template
HIPAA Security and Privacy Rules
45 CFR Parts 160 and 164; Security Rule with 2025 proposed update tracked
next seed

Planned reusable template for administrative, physical, and technical safeguard evidence with source-backed CFR mapping.

2
native IDs
3
collectors
13
seed rows
45 CFR 164.312(a)(1)45 CFR 164.308(a)(5)
Open program template
HITRUST CSF
CSF v11.7.0
next seed

High-value healthcare assurance template. Build after HIPAA/SOC 2 primitives so HITRUST can reuse the shared control spine.

3
native IDs
4
collectors
21
seed rows
09.z01.aCVID 3207.0
Open program template
NIST Cybersecurity Framework
NIST CSF 2.0
next seed

Planned reusable template for risk governance and security operations evidence mapped to native CSF outcomes.

3
native IDs
3
collectors
5
seed rows
GV.RM-01ID.AM-01PR.AA-01
Open program template
PCI DSS 4.0
PCI DSS v4.0.1
next seed

Planned reusable template for cardholder data environment scoping, access controls, logging, vulnerability evidence, and SAQ/ROC support.

3
native IDs
4
collectors
9
seed rows
8.4.210.2.112.3.1
Open program template
SOC 2 Trust Services Criteria
2017 TSC with revised points of focus - 2022
next seed

Planned reusable template for control narratives, tickets, cloud configuration, access reviews, and auditor packages.

3
native IDs
3
collectors
18
seed rows
CC6.1CC7.2A1.2
Open program template
FedRAMP
Rev. 5 baselines / FedRAMP 20x tracked
planned

Federal cloud-assurance template. Requires strict package fidelity, OSCAL support, and deployment isolation options.

4
native IDs
4
collectors
5
seed rows
AC-2SC-8SI-2CA-7
Open program template
General Data Protection Regulation
Regulation (EU) 2016/679
planned

Privacy-program template that should share inventory, vendor, data-flow, and security evidence with HIPAA, SOC 2, ISO, and NIST.

3
native IDs
4
collectors
5
seed rows
Article 30Article 32Article 35
Open program template
ISO/IEC 27001
ISO/IEC 27001:2022
planned

Global ISMS template. Strong reuse candidate across SOC 2, HITRUST, NIST, and ISO 42001 governance evidence.

3
native IDs
3
collectors
5
seed rows
Clause 6.1.2A.5.15A.8.15
Open program template
ISO/IEC 42001 AI Management System
ISO/IEC 42001:2023
planned

Planned reusable template for AI system inventory, risk treatment, monitoring, and management review evidence.

3
native IDs
3
collectors
6
seed rows
6.1.28.29.1
Open program template
NYDFS Cybersecurity Regulation
23 NYCRR Part 500 with Second Amendment effective 2023-11-01
planned

Financial-services cyber template. Useful for showing ControlFrame can support regulation-specific deadlines, attestations, and notification workflows.

4
native IDs
4
collectors
5
seed rows
500.2500.7500.12500.17
Open program template