Architecture
How Obsinto works
Your cloud already proves compliance. Obsinto makes it visible. Two layers work together. Observability surfaces the signals. Intelligence interprets what they mean for your compliance posture.
Instrument your infrastructure
Connect your AWS account via IAM role. Obsinto accesses Config, CloudTrail, and Security Hub. No agents to install. No code changes. Read-only access to your existing infrastructure telemetry.
Source
AWS Config
Resource state snapshots
Source
CloudTrail
API activity events
Source
Security Hub
Security findings
Also supports: Google Drive, SharePoint, S3 for document-based evidence sync.
Upload the evidence your cloud cannot emit
Policies, attestations, access reviews, vendor assessments. Drag in the artifacts that live in Drive, Notion, or a shared folder, and Obsinto parses, tags, and maps them to the controls they satisfy.
Access Control Policy v3.2.pdf
Manual upload → Parsed → AC-1, AC-2, AC-6 mapped
Q1 Quarterly Access Review screenshot
Manual upload → Tagged → AC-2(1), AC-6(7) mapped
Vendor attestation, payroll processor
Manual upload → Parsed → SA-9, SA-12 mapped
Signals emit as your systems run
Every infrastructure event becomes a compliance signal automatically. Deployments, IAM changes, config updates, each one classified as evidence and mapped to the controls it affects. No manual collection. No re-collection sprints before audit.
IAM policy change detected
CloudTrail → Signal emitted → AC-6(9) control mapped
S3 encryption config verified
AWS Config → Signal emitted → SC-8, SC-28 controls mapped
Least-privilege review completed
Security Hub → Signal emitted → AC-6 control family mapped
Know your live compliance posture
Every signal and uploaded document is classified and matched to specific framework controls. Obsinto scores the match, surfaces gaps, generates audit-ready narratives, and tracks how your posture evolves. One live view of what passes, what drifts, and what needs attention.
Control Match
50% matchAC-6(9): Log Use of Privileged Functions
Supports 0 covered statement(s) and 0 covered objective(s). Still missing 1 statement(s) and 0 objective(s).
Intelligence-Generated SSP Narrative
"The organization employs automated mechanisms to audit the execution of privileged functions. AWS CloudTrail logging captures all IAM policy changes and privilege escalations..."
Live posture
Updated continuously
Audit package
Builds every day
Frameworks supported
One platform. Multiple frameworks. Evidence mapped natively across all of them.
SOC 2 (Type I & II)
Primary entry point. Trust Services Criteria mapped to infrastructure evidence.
NIST SP 800-53 Rev. 5
Full control catalog with 19 families. Baseline-aware scoping.
FedRAMP
OSCAL-native from day one. Supports Low, Moderate, and High baselines. Built for FedRAMP 20x machine-readable evidence requirements.
See it on your infrastructure
20-minute call to see if your stack fits. If it does, we connect and you see compliance signals in days, not months.
Apply for early access →