Skip to main content
Argitron
Menu

Pillar · Audit

Continuous control testing — and the evidence to prove it.

The auditor's first 'show me the evidence' email is when most compliance projects discover they have screenshots, not artefacts. Argitron emits framework-tagged, signed, hash-chained evidence as a byproduct of every check it runs.

Vulnerability + misconfig scanning IaC + secrets Reachability-aware KEV / EPSS prioritised Cosign-signed bundles

What gets continuously tested

Asset discovery

Cloud accounts, containers, repos, SaaS apps, endpoints. The asset register is the union of what we find — not what someone remembered to enter into a spreadsheet.

Vulnerability + misconfiguration

Industry-standard scanners + our own additions. Reachability-aware scoring: we don't surface a CVE for a library that's not on the call graph from an internet-exposed endpoint.

IaC scanning

Terraform, CloudFormation, Pulumi, Helm, Kubernetes manifests. Findings link to the policy they violate and the patched template the engineer can merge.

Secrets in repos

Pre-commit and post-commit detection. Auto-rotation playbooks for known credential types. History rewrite guidance.

Container image scanning

Base-image diffing, package CVE matching, KEV / EPSS prioritisation, license + provenance (SLSA) checks. Build-time and registry-time.

Identity + access posture

Stale accounts, MFA gaps, role explosions, dormant service principals. Findings link directly to A.5.16–A.5.18.

From finding to evidence — automatically

A scanner finds a misconfigured S3 bucket. In a typical stack, the journey to "evidence the auditor accepts" looks like this:

  1. Scanner alerts in tool A.
  2. Engineer opens a Jira ticket (B).
  3. Fix shipped via change request in tool C.
  4. GRC analyst manually attaches a screenshot to a control in tool D.
  5. Auditor asks for the timeline; analyst spends a day reconstructing it.

In Argitron:

  1. Finding is created. It links to the asset, the owning service, and the relevant Annex A controls (A.5.23 cloud services, A.8.9 configuration, A.8.4 access to source).
  2. Remediation playbook opens a PR or runs a change.
  3. On close, the change record + scanner re-test + before/after configuration are bundled and signed.
  4. Auditor exports the bundle for the relevant controls. Done.

Evidence the auditor can verify offline.

Cosign-signed, hash-chained, WORM-stored. No screenshot archaeology.