Open Source ยท Apache 2.0

Ground your infrastructure.
Attest your controls.
Qualify your people.

A suite of open-source tools for deploying, enforcing, and proving compliance in AWS Secure Research Environments.

# 1. deploy correct foundations
ground deploy --config ground.yaml
โœ“ Organization provisioned
# 2. compile and enforce controls
attest init && attest compile && attest apply
โœ“ 47 controls enforced
# 3. scan and generate evidence
attest scan && attest generate ssp
โœ“ Compliant โ€” SSP generated from live state

The Provabl Suite

Three tools, one compliance loop. Each has exactly one job.

How It Works Together

Each tool has one job. Together they close the compliance loop.

# Step 1 โ€” ground deploys correct foundations
ground deploy --config ground.yaml
โœ“ Org structure, network, identity, logging, security baseline provisioned โœ“ Permission boundaries enforced, VPC endpoint policies org-scoped
# Step 2 โ€” attest discovers, compiles, and enforces
attest init --region us-east-1
attest frameworks add cmmc-level-2 hipaa
attest compile --scp-strategy merged
attest apply --approve
โœ“ 47 controls compiled โ†’ SCPs deployed, Cedar policies active
# Step 3 โ€” qualify gates access by training completion
# researcher completes CUI + HIPAA modules in qualify
โœ“ IAM role tagged: attest:cui-training=true, attest:hipaa-training=true โœ“ Cedar PDP re-evaluates โ€” access granted automatically
# Step 4 โ€” attest makes the compliance claim
attest scan
attest generate ssp --framework cmmc-level-2
โœ“ Compliant (43/47 enforced, 4 operational) โœ“ SSP generated from live AWS state โ€” not manually assembled

Design Principles

Built for SREs and compliance officers who cannot afford surprises.

Separation of claims

ground makes zero compliance claims. It deploys correct foundations. attest makes the claim โ€” only after attest scan on live state.

Policies are tested

Every IAM boundary, SCP, and Cedar policy ships with unit tests. Permission boundaries are verified to deny privilege escalation before they deploy.

Live state, not documentation

Evidence is generated from what is actually deployed. SSPs, OSCAL, and SPRS reflect the real posture at scan time โ€” not what someone wrote in a doc.

Training gates access

qualify writes IAM tags on training completion. Cedar policies evaluate those tags before granting data access. No training means no access โ€” enforced at the policy level.

Open core

Compilers, policy schemas, CLI tools, and framework definitions are open source. Commercial features fund ongoing development.

Proactive, not reactive

The AI navigator surfaces obligations before they become violations. Training expiry, DUC renewals, CMMC windows โ€” flagged 30โ€“90 days out.