Introducing the anecdotes Security Compliance Data Standard

Finally, a data standard for any Compliance use case that is adopted by leaders in the ecosystem, including Coalfire, Deloitte, PwC, EY, KPMG and Schellman.

Get a Demo
vi image
Free 30-day trial
vi image
Fast onboarding
vi image
Unlimited plugins & frameworks
Learn why Coalfire chose The anecdotes Data Infrastructure to provide standardized data to their Compliance Essentials platform
here

Why a Data Standard is Needed

Mature organizations adopt new technologies at a pace in which even the best of GRC teams can’t always keep up. In order to ensure that the use of these tools is in line with the organization’s security Compliance standards, the team must learn each tool, define control objectives and determine what data needs to be monitored for each control. Instead of each Compliance team having to do this tedious work, and wondering if the data will be accepted by the rest of the Compliance ecosystem, there is a need for a robust security Compliance data standard.

The Three Pillars of the
Industries New Data Standard

In order to avoid wasting time and resources every time a new tool is onboarded or a new framework is adopted it's clear that there is need for a new, widely accepted data standard for the security Compliance ecosystem. After consulting with top experts and auditors in the industry, anecdotes set out on a journey to create a data standard that would do three main things:

Define what data artifacts are necessary to transform the entire security Compliance ecosystem to rely on data.

Determine how the data should be presented so that it is both clear and actionable.

Specify what the data artifacts need to include in order for them to be credible.

Define what data artifacts are necessary to transform the entire security Compliance ecosystem to rely on data.

Determine how the data should be presented so that it is both clear and actionable.

Specify what the data artifacts need to include in order for them to be credible.

optional title

1. What Data is Required

Based on the collective decades of experience and the expertise of the industry leaders who contributed to our efforts, anecdotes has built a proprietary register of required data artifacts from each source (for example Dev tools, ticketing systems and cloud infrastructures). The anecdotes Data Standard creates clarity and confidence into what teams need in order to satisfy any requirement from across their Compliance program.

optional title

2. How the Data Should Be Presented

Knowing exactly what data you need is not enough. Neither is having the raw data. In order for the data to be actionable, it needs to be presented in a way which is “user friendly” while maintaining its integrity and flexibility. The anecdotes Data Standard defines a simple and intuitive table structure for the data. Not only does this view give you a clear understanding of the data, the live table allows you to segment, scope, filter and analyze the data to further personalize it to meet your objectives.

optional title

3. Why the Data is Trusted

The anecdotes Data Standard is based on the idea that credibility stemming from irrefutable integrity is a necessity. In order to ensure that all of the standardized data continues to be trusted by the entire ecosystem, it must be immutable and traceable. The anecdotes Data Standard defines strict safeguards and processes that need to be implemented in order for the data to meet these requirements, all of which are followed by The anecdotes Data Infrastructure.

Applying the Standardized Data
to any Compliance Use Case

The same standardized data can be (and automatically is, in the anecdotes Compliance OS,) cross-mapped to all relevant use cases. For example, you can use the same user list and configuration that was collected to ensure that multifactor authentication is in place, in order to perform user access reviews; Data artifacts that show how the backups used in production across multiple environments are encrypted, can also be mapped to set the impact level of the the "data loss risk entity" in your risk register. The examples are endless, just like your possibilities.

Fuel Your Compliance Engine With Data

The anecdotes Compliance OS* has got you covered from every angle.

* What is OS?
We know what you’re thinking – OS = fancy buzzword, roll m’ eyes. Yeah, maybe in some cases – but not here. An Operating System is a digital workspace that provides various applications to be used as needed, regardless of the underlying hardware and sources. With the anecdotes Compliance OS, you can choose whatever application you need with full autonomous background processes to support them. And that’s why it’s a real OS.

Application Layer - Every business process and need has a correlating application, enabling it to correspond to, and answer, different challenges. 

Data Pool Layer -
Normalized and structured data in an evidence pool serves as the basis of every application usage. 

Plugins Layer - Dozens of plugins from the most common tools and environments, to extract all the data needed for the Compliance OS and the Data Pool Layer.

This is how it works:
We start at the Plugins Layer. This is where evidence is automatically collected from multiple sources; on-premise, private cloud, public cloud, and SaaS tools. Ya know, everything, basically.
Last is the Application Layer. This is where the magic happens. Every business process and need has a correlating application, which enables it to correspond to, and answer, different challenges.
Next comes the Data Layer. This is where normalized and structured data is housed in an evidence pool to serve as the basis of every application usage. (No, not that kind of pool. But still beneficial.)
These layers and processes form the basis of the anecdotes Compliance OS, a fundamental change to the way Compliance has always worked. Or not worked, really. 
Start your free trial
Our Clients & Partners

Want More Credible Evidence?

Read {company_name}’s Case Study and find out how one of the biggest {company_industry}  companies in the world owned their compliance and took it to the next level with anecdotes Compliance OS

Read {company_name} Case Study

Start Free Trial
dashes

anecodotes' innovative approach to data sharing is a hallmark of a new generation of cybersecurity solutions that deliver maximum value by breaking down data silos between vendors and customers.

omer image
Omer Singer
Head of Cyber Security Strategy @ Snowflake
dashes

As Ginzi grows, our Compliance process becomes more complex. anecdotes makes meeting new frameworks simple.

Ben image
Ben Jacobs
Co-founder and CEO @Ginzi
dashes

anecdotes is a competitive advantage. We are able to increase trust with our customers by giving them the option to monitor our Compliance posture in real time on the anecdotes platform.

Jonathan image
Jonathan Schneider
Co-founder and CEO @Moderne, Inc.
dashes

anecdotes does more than just automation. Based on a deep understanding of our business, anecdotes has helped us make the cultural changes we needed to make sure we are compliant.

Asaf image
Asaf Moses
Founder & CEO @CredCompare
dashes

With anecdotes, we were able to easily collect evidence for our ISO 27001:2018 certification, with plugins that easily connected to most of our infrastructure and automatically gathered all of the necessary information. This saved us a lot of precious time.

Vlad image
Vladislav Gust
Information Security Officer @PortXchange
arrow right

With The anecdotes Data Standard You Have:

Trustworthiness and Credibility

Ecosystem-vetted structured data as the basis for any of your current and future Compliance needs

Clarity and Consistency

Data sets that are contextualized and ready to be used in an easy and intuitive way

Reusability and Efficiency

The same standardized data set for all relevant use cases with everything scoped and crossed-mapped

Scale Your Compliance With the Only Solution for Growing Companies

Made for Your Complex IT Stack

From your cloud environments to your SaaS tools, connect it all – without complexity limits.

Customized for Your Success

Tailor your frameworks, controls, and internal audits to meet the specific needs of your program.

Cross-Framework Solution

We map evidence to all applicable/relevant controls and frameworks, creating true cross-mapping across frameworks.

Robust Security Architecture

Store data and secrets in your own environment to own and retain them at all times. 

Data-Powered Compliance

Utilize data-powered Compliance artifacts to gain true visibility into your Compliance posture.

One Workspace for Your Needs

Centrally address all your Compliance needs, with a holistic solution that pairs advanced automation with monitoring capabilities.

vi image

Made for Your Complex IT Stack

From your cloud environments to your SaaS tools, connect it all – without complexity limits.
vi image

Robust Security Architecture

Store data and secrets in your own environment to own and retain them at all times. 
vi image

Customized for Your Success

Tailor your frameworks, controls, and internal audits to meet the specific needs of your program.
vi image

Data-Powered Compliance

Utilize data-powered Compliance artifacts to gain true visibility into your Compliance posture.
vi image

Cross-Framework Solution

We map evidence to all applicable/relevant controls and frameworks, creating true cross-mapping across frameworks.
vi image

One Workspace for Your Needs

Centrally address all your Compliance needs, with a holistic solution that pairs advanced automation with monitoring capabilities.