Common Questions

Most Popular Questions

Compliance, like source code, is often reusable. A majority fo the compliance performed in inherited infrastructure, reused containers for IAM, etc, changes very little. Ironically, while 70-90% of source code is reused in most development, a compliance is performed uniquely each time.

Reusable compliance is the biggest accelerator for generating compliance or new applications, when refactoring and retailoring.

Yes. Synergeo enables compliance-enrichment of containers and repositories. When building from the code artificats, controls which were stored as compliance-as-code are instantly imported and assembled, easily forming a complete control set in minutes.

While Synergeo can produce 100% “Assessment-Ready” controls from compliance-enriched container images and code repos, it is common to have a few controls which needing editing before final assessment.  

Compliance-enrichment  written to container images and code repos is captured  three ways: ITERATIVELY, INCREMENTALLY & BULK ASSIGNMENT

ITERATIVELY – “Shift Left”, synchronously with development, compliance is aligned with each branch pull, simplifying DevOps by aligning work items with related controls. Control associations to code provide mapping for quick reference and documented body of evidence supporting attestation.

INCREMENTALLY – Controls are committed individually, in the User Interface when responses are entered or edited. Users instantly add or remove associations to code, files, folders or images providing necessary body of evidence for attestation.

BULK ASSIGNMENT – Allows selected controls sets to be associated to containers and repos, in seconds.

Compliance as Code (CaC) is the practice of automating compliance policies, security controls, and regulatory requirements using code. It enables organizations to define, enforce, and monitor compliance requirements programmatically instead of relying on manual audits and documentation.

Synergeo uses Open Security Controls Assessment Language (OSCAL) to document security controls, SSP Body of Evidence and optionally Artifict encapsulation.

Compliance-enrichedment  written to container images and code repos is captured  three ways: ITERATIVELY, INCREMENTALLY & BULK ASSIGNMENT

ITERATIVELY – “Shift Left”, synchronously with development, compliance is aligned with each branch pull, simplifying DevOps by aligning work items with related controls. Control associations to code provide mapping for quick reference and documented body of evidence supporting attestation.

INCREMENTALLY – Controls are committed individually, in the User Interface when responses are entered or edited. Users instantly add or remove associations to code, files, folders or images providing necessary body of evidence for attestation.

BULK ASSIGNMENT – Allows selected controls sets to be associated to containers and repos, in seconds.

Branch Triggered Versioining (BTV) begins with a trigger, commonly a secure webhook, which tells Synergeo to create a versioned virtual copy of the Controls. This virtual version allows Dev and Compliance engineers to edit control documentation and provide evidence synchronously or at a later time.

On a development branch merge, Synergeo writes all controls and BoE data as compliance-as-code to the repository or secure storage for containers and creates a transaction entry for archival of the original control values.

Then, based on selected optons, Synergeo automatically merges the virtual control DIFFs into the master controls; or alerts the ISSM / ISSO that a pending BTV merge is waiting, allowing manual execution of merge functions in cased additional documentation or review is desired.

The end result is compliance work is performed, creating and writing compliance-enrichment into repos or containers, capturing code-to-compliance associations along provenance metadata (date, user, hash of code repo/container)

Yes. Synergeo offers extensive importing and exporting.

Importing into Synergeos simplified, allowing prior works to be quickly ingested and assembled into proper structure for accelerating ATO-ready states.

Exporting can be performed in formatted tempalets or raw data exports, for any data, metadata or artifacts stored in Synergeo.

Import and Export methods supported:

Templated documents:           Word or PDF

Structured Data:                     csv, xml, json

RESTful API:                            Extensive API for programmatic population

Dynamnic Tailoring (DT) is tailoring on steroids. It allows adding and reverting of Baselines, Overlays, Inhertitnace and Syngergeo (SGO) temnplates anytime during the life of a System Security Plan.

Unique to Synergeo is how tailoring is converged with Compliance Versioning, providing the ability preview how tailoring will be applied, provides the ability to reference the tailoring changes at the control level offering before and after comparisons, and finally provides automatic deconfliction should one or more tailoring object create an overlapping conflict.

Using Synergeo’s templates, users can create their own custom tailoring objects which can implemented across all projects. Templates manage any elements of the SSP, including Responses, Implementation Status, Customner Responsibility, Control Origination, Artifaacts and CaC Associations & provenance metadata

Dynamnic Tailoring (DT) is tailoring on steroids. It allows adding and reverting of Baselines, Overlays, Inhertitnace and Syngergeo (SGO) temnplates anytime during the life of a System Security Plan.

Unique to Synergeo is how tailoring is converged with Compliance Versioning, providing the ability preview how tailoring will be applied, provides the ability to reference the tailoring changes at the control level offering before and after comparisons, and finally provides automatic deconfliction should one or more tailoring object create an overlapping conflict.

Using Synergeo’s templates, users can create their own custom tailoring objects which can implemented across all projects. Templates manage any elements of the SSP, including Responses, Implementation Status, Customner Responsibility, Control Origination, Artifaacts and CaC Associations & provenance metadata

Synergeo collects provence metadata to facilitate the integrity of certification, ensuring the body of evidence used to obtain a certification is immutably referencable.

Collected provenance metadata covers: Source Code, Repos, Container Images, Infrastructure files, Configuration files, AI Data Models & Data Sets and all Artifacts