Skip to content

Evidence Connectors

TruthVouch automatically connects to your infrastructure to collect evidence proving controls are working. You configure each connector once, then Compliance AI pulls live data during scans — no manual evidence gathering required.

Evidence library with automatically collected compliance evidence

Supported Connectors

Cloud Infrastructure

  • AWS: CloudTrail logs, IAM policies, KMS encryption, VPC security
  • Azure: Activity logs, managed identity, encryption, security controls
  • Google Cloud: Cloud Audit Logs, IAM bindings, encryption
  • Kubernetes: RBAC policies, network policies, resource logs

Development & Code

  • GitHub: Code commits, secret scanning, branch protection, security advisories
  • GitLab: CI/CD logs, code quality, security scanning
  • Azure DevOps: Build logs, release pipelines, test results

Identity & Access

  • Okta: User access reviews, MFA enforcement, audit logs
  • Azure AD: Sign-in logs, access reviews, device compliance
  • 1Password: Vault access logs, team members
  • HashiCorp Vault: Access logs, secret rotation

Monitoring & Observability

  • Datadog: Performance metrics, alerting, logs, infrastructure monitoring
  • Prometheus: Metrics, scrape configs, alerting rules
  • CloudWatch: Metrics, logs, alarms
  • Dynatrace: Performance monitoring, security controls

Communication & Collaboration

  • Slack: Channel activity (for training evidence), announcements
  • Microsoft Teams: Chat, training announcements

IT Service Management

  • ServiceNow: Change management, incident tickets, CMDB
  • Jira: Issue tracking, incident response, remediation tasks

How to Configure Connectors

  1. Go to Settings > Integrations
  2. Select connector
  3. Authenticate (OAuth2 or API key)
  4. Grant minimal required permissions
  5. Test connection
  6. Click Enable

Compliance AI securely stores credentials and rotates API keys automatically.

What Each Connector Provides

ConnectorEvidence TypeExamples
AWSInfrastructure logs, IAM policy, encryption status”S3 bucket encrypted with KMS”
GitHubCode history, secret scanning”Commit log showing code review”
OktaAccess control, MFA”All users have MFA enabled”
DatadogPerformance monitoring, alerting”Model accuracy dashboard showing 92% accuracy”
ServiceNowChange management, incidents”Change ticket #CHG-12345 approved and deployed”

Best Practices

  1. Minimal permissions: Grant only what’s needed (read-only when possible)
  2. Secure credentials: Use OAuth2 or service accounts, never personal tokens
  3. Monitor access: Review audit logs of connector access
  4. Rotation: Periodically rotate API keys (at least annually)
  5. Test connectivity: Verify monthly

Setup by Connector

AWS

  1. Go to SettingsIntegrationsAWS
  2. Click Connect AWS Account
  3. Choose auth method:
    • IAM Role (recommended): Use CloudFormation template
    • Access Keys: Enter AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY
  4. Grant permissions: Read-only access to CloudTrail, CloudWatch, IAM, KMS
  5. Test connection
  6. Click Enable

What’s Collected:

  • CloudTrail logs (all API calls)
  • IAM policies and MFA status
  • KMS encryption keys
  • VPC security group rules
  • S3 bucket encryption

GitHub

  1. SettingsIntegrationsGitHub
  2. Click Authorize GitHub
  3. Grant permissions to repositories
  4. Select which repos to monitor
  5. Click Enable

What’s Collected:

  • Commit history and code reviews
  • Branch protection rules
  • Secret scanning alerts
  • Dependabot vulnerability alerts
  • Release history

Okta

  1. SettingsIntegrationsOkta
  2. Enter Okta domain: yourcompany.okta.com
  3. Generate API token in Okta admin
  4. Paste API token
  5. Click Test & Enable

What’s Collected:

  • User directory and group memberships
  • MFA enrollment status
  • App assignments and access
  • Sign-in logs
  • Policy rules

ServiceNow

  1. SettingsIntegrationsServiceNow
  2. Enter instance URL: yourcompany.service-now.com
  3. Create service account in ServiceNow
  4. Enter username/password or OAuth credentials
  5. Grant permissions: Read/write on Change, Incident, CMDB tables
  6. Click Enable

What’s Collected:

  • Change management approvals
  • Incident tickets and resolution
  • Configuration items
  • Deployment records
  • Maintenance windows

Datadog

  1. SettingsIntegrationsDatadog
  2. Generate API key in Datadog
  3. Enter API key and App key
  4. Specify which dashboards/monitors to pull
  5. Click Enable

What’s Collected:

  • Dashboard metrics and visualizations
  • Monitor alert status
  • Log data
  • Performance metrics
  • Security event logs

Azure

  1. SettingsIntegrationsAzure
  2. Click Authorize Azure
  3. Sign in with Azure account
  4. Select subscription
  5. Grant permissions to read Activity Logs, identity, encryption
  6. Click Enable

What’s Collected:

  • Activity logs
  • Managed identity configurations
  • Encryption status
  • Access reviews
  • Device compliance

Evidence Collection Frequency

  • Real-Time: Auth/access events (Okta, Azure AD)
  • Hourly: Infrastructure metrics (AWS, Azure)
  • Daily: Code commits, incident tickets
  • Weekly: Summary reports, compliance scans

You can force manual refresh:

  1. SettingsIntegrations → [Connector]
  2. Click Refresh Now

Troubleshooting Connectors

Connection Failed

  1. Verify credentials are still valid
  2. Check API key hasn’t been rotated
  3. Verify permissions still granted
  4. Try Refresh Now button
  5. Check Recent Activity log for error details

No Data Collected

  1. Verify connector is Enabled (toggle on)
  2. Check if permissions include needed resources
  3. Ensure systems have actual data to collect
  4. Try Refresh Now
  5. Wait 30 minutes for initial collection

Too Many Permissions Requested

We request minimum needed for evidence collection:

  • Read-only access when possible
  • No write/delete permissions
  • Scoped to specific resources

This is intentional for security.

Next Steps

  • Configure your first connector: Go to Settings > Integrations
  • Manual evidence upload: Manual Evidence for systems not yet integrated
  • Review evidence: Evidence Review