Generate an audit-grade evidence manifest with cryptographic hash, timestamp, and full source tracking.
1
Configure
2
Fetch Data
3
Generate Hash
🎯 Configure Evidence Pack
Evidence Pack Generated Successfully
Audit-grade manifest with cryptographic integrity. Designed to support DORA documentation workflows.
🔑 Content Hash (SHA-256)
✓ Copied! Run in terminal to verify your downloaded JSON.
🔐 Runtime Policy Check
📋 Manifest Metadata
📄 Full Evidence Manifest
Audit Trail Usage:
- Store in ICT risk register (supports Art. 28(3) register of information)
- Reference manifest_id in vendor documentation
- Verify integrity: compare content_hash against your stored copy (self-verification)
- Optional: Request on-chain anchor for tamper-proof record
🛡️ Integrity Roadmap
✓ NOW: Data integrity + TTL + ECDSA signature
→ NEXT: Attested runtime (TEE) + key isolation
Receipts will be bound to verified code running in a measured enclave.