Skip to content
Opsfolio Docs
Search
Ctrl
K
Cancel
GitHub
Discord
Select theme
Dark
Light
Auto
Understanding Compliance Processes for Technical Staff
Introduction to Compliance Frameworks
Overview of Compliance Frameworks
Regulatory and Industry-Specific Compliance Frameworks
Implementing Compliance Frameworks in Organizations
Case Studies and Practical Applications
Conclusion and Next Steps
Key Concepts in Compliance
Understanding Controls
Policies and Procedures
Human Attestation vs. Machine Attestation of Evidence
Documenting Compliance
Implementation of Technical Controls
Automation in Compliance
Continuous Compliance Monitoring
Incident Response and Management
Risk Management and Assessment
Advanced Topics in Policies and Procedures
Practical Lab Exercises
Implementing Compliance Frameworks in Organizations
Implementing Controls
Integration of Controls into Software Development, Operations, and Quality Assurance Processes
Case Studies and Examples of Control Implementation in Real-World Scenarios
Developing Policies and Procedures
Generating and Managing Evidence
Types of Evidence
Human Attestation vs. Machine Attestation
Documenting Compliance
Evidence Management Lifecycle
Advanced Techniques for Collecting and Preserving Evidence
Auditing and Assurance
Overview of Auditing
Preparing for Audits
Advanced Topics for a Technical Audience
Case Studies and Practical Applications
Human Attestation vs Machine Attestation
Introduction to Human Attestation vs. Machine Attestation
Understanding Human Attestation
Understanding Machine Attestation
Transitioning from Human to Machine Attestation
Practical Applications and Case Studies
Future Trends in Attestation
Automating Compliance
Introduction to Automating Compliance Frameworks
Overview of Automating Compliance Frameworks
Key Components of Automated Compliance Frameworks
Automating Key Concepts in Compliance
Automating Controls
Automating Policies and Procedures
Implementing Automated Compliance Frameworks in Organizations
Implementing Automated Controls
Integration of Automated Controls into Software Development, Operations, and Quality Assurance Processes
Generating and Managing Evidence in an Automated Context
Types of Evidence in Automated Compliance
Techniques for Collecting and Preserving Automated Evidence
Automating Auditing and Assurance
Automating Auditing and Assurance
Preparing for Automated Audits
Advanced Topics for a Technical Audience
Resource Surveillance
Getting Started
How-to
Installation Guide
How to Collect Evidence
How to Ingest and Query Large JSON Files
How to Prepare Evidence at The-Edge
How to Orchestrate Evidence
How to Preview Evidence via surveilr SQLPage Integration
Tutorials
Reference
Database
State Schema
State Schema
Behavior
Device
Device Party Relationship
Gender Type
Orchestration Nature
Orchestration Session
Orchestration Session Log
Orchestration Session Entry
Orchestration Session Exec
Orchestration Session Issue
Orchestration Session Issue Relation
Orchestration Session State
Organization
Organization Role
Organization Role Type
Party
Party Type
Party Relation
Party Relation Type
Person
Uniform Resource
Uniform Resource Transform
Uniform Resource Ingest Resource Path Match Rule
Uniform Resource Ingest Resource Path Rewrite Rule
Uniform Resource Ingest Session
Uniform Resource Ingest Session Attachment
Uniform Resource Ingest Session Fs Path
Uniform Resource Ingest Session Fs Path Entry
Uniform Resource Ingest Session IMAP Account
Uniform Resource Ingest Session IMAP Account Folder
Uniform Resource Ingest Session IMAP Account Folder Message
Uniform Resource Ingest Session PLM Account
Uniform Resource Ingest Session PLM Account Label
Uniform Resource Ingest Session PLM Account Project
Uniform Resource Ingest Session PLM Account Project Issue
Uniform Resource Ingest Session PLM Account Relationship
Uniform Resource Ingest Session PLM Comment
Uniform Resource Ingest Session PLM Issue Reaction
Uniform Resource Ingest Session PLM Issue Type
Uniform Resource Ingest Session PLM Milestone
Uniform Resource Ingest Session PLM Reaction
Uniform Resource Ingest Session PLM User
Uniform Resource Ingest Session Task
Uniform Resource Ingest Session UDI-PGP SQL
Notebooks Schema
Notebooks Schema
Assurance Schema
Code Notebook Cell
Code Notebook Kernel
Code Notebook State
Ingestion
Files Ingestion
Tasks Ingestion
Capturable Executables
IMAP Emails Ingestion
Admin
Merge
Extending Surveilr
Content Extensibility with Capturable Executables
SQL DDL Extensibility with SQL Notebooks
Integrated TypeScript programmability and scriptability
UDI
PGP
Introduction
Concepts
RSSD
WPAs
Support
Filestash
RCLONE
CLI Arguments
CLI Commands
Aggregating RSSDs
Code Notebooks
Terminologies
Disciplines and WPAs
Software Engineers
System Engineers
QA Engineers
Security Analysts/Engineers
Compliance Officers
Regulatory Affairs Specialists
Project Managers
Configuration Management Specialists
Database Administrators
Network Administrators
DevOps Engineers
Technical Writers
UI/UX Designers
Legal Counsel
Subject Matter Experts
Customer Support Representatives
Training and Education Specialists
Risk Management Specialists
Incident Response Team Members
Performance and Reliability Engineers
Procurement Specialists
Auditors
External Assessors
Ethical Hackers
Penetration Testers
Compliance Automation Specialists
Business Analysts
Product Owners
Product Managers
Human Factors Engineers
System Integrators
Change Management Specialists
Legal and Regulatory Consultants
Supply Chain Managers
Facilities Managers
Medical Device Specialists
Aerospace Engineers
Automotive Engineers
FAQs
Roadmap
Releases
v0.9.9
v0.9.10
v0.9.12
v0.9.13
v0.9.14
v0.9.16
v0.9.17
v0.10.0
v0.10.1
v0.10.2
v0.11.0
v0.13.0
v0.13.1
v0.13.2
v0.13.3
v0.13.4
v0.13.5
v0.13.6
v0.21.0
v0.22.1
v0.23.0
v0.24.0
v0.25.1
v0.26.0
Ecosystem Tools
Microsoft Threat Modeling (MTM) Tool
PII and PHI De-Identification Strategy for "edge" Data Ingestions
Introduction
Opsfolio Suite
Vision & Mission
Portfolio
Portfolio
Policies
Policies
Controls
Controls
FAQs
GitHub
Discord
Select theme
Dark
Light
Auto
CLI Arguments