Overview
Openlane Console provides a complete compliance management system with five core modules: Controls, Policies, Procedures, Risks, and Evidence. These modules work together to help organizations achieve and maintain compliance across multiple frameworks.All compliance features are located in the
/app/(protected) directory and share common patterns for CRUD operations, filtering, and relationship mapping.Controls
Security controls are the foundation of compliance programs. Controls represent security measures, safeguards, and processes that protect your organization.Control Structure
Controls can be organized hierarchically:Control Management
Access controls at/controls:
- View Controls
- Create Control
- Subcontrols
- Control Objectives
The Control Switcher provides multiple views:
- List View: Tabular display of all controls
- Tree View: Hierarchical visualization
- Framework View: Grouped by compliance framework
- Status View: Filtered by implementation status
- Framework (SOC 2, ISO 27001, HIPAA, etc.)
- Status (Not Started, In Progress, Implemented, Verified)
- Owner/Assignee
- Tags and categories
Control Implementation
Track control implementation at/controls/{id}/control-implementation:
Implementation Phases
Implementation Phases
- Design: Define how the control will be implemented
- Build: Implement technical/process controls
- Test: Validate control effectiveness
- Operate: Put control into production
- Monitor: Ongoing effectiveness monitoring
Implementation Evidence
Implementation Evidence
Document implementation with:
- Configuration screenshots
- Policy documents
- Procedure documentation
- Training materials
- Test results
Control Testing
Control Testing
Regular testing validates effectiveness:
- Frequency: Monthly, quarterly, or annually
- Test Procedures: Step-by-step validation
- Sample Selection: Items to test
- Expected Results: Pass/fail criteria
- Actual Results: Test outcomes
Control Mapping
Map controls to frameworks at/controls/{id}/map-control:
/controls/{id}/edit-map-control.
Clone Controls
Duplicate existing controls at/controls/{id}/clone-control:
- Copy control structure and objectives
- Maintain framework mappings
- Reset implementation status
- Assign to new owner
Cloning is useful for:
- Creating similar controls for different systems
- Reusing control templates
- Standardizing across departments
Policies
Internal policies document organizational rules and requirements.Policy Management
Access policies at/policies:
- Create Policy
- Policy Lifecycle
- Version Control
- Policy Relationships
Navigate to
/policies/create to create a policy:- Policy Name: e.g., “Information Security Policy”
- Policy Number: Document control number
- Version: Version tracking (1.0, 2.0, etc.)
- Owner: Policy owner/sponsor
- Approver: Who must approve changes
- Review Schedule: How often to review
- Effective Date: When policy takes effect
- Content: Full policy text (supports Markdown)
Policy Templates
Common policy templates:- Information Security Policy
- Acceptable Use Policy
- Access Control Policy
- Data Classification Policy
- Incident Response Policy
- Business Continuity Policy
- Vendor Management Policy
- Privacy Policy
Procedures
Procedures provide step-by-step instructions for implementing policies and controls.Procedure Management
Access procedures at/procedures:
- Create Procedure
- Procedure Format
- Execution Tracking
Navigate to
/procedures/create:- Title: e.g., “User Provisioning Procedure”
- Procedure ID: Reference number
- Related Policy: Link to governing policy
- Owner: Procedure owner
- Frequency: How often executed (daily, monthly, etc.)
- Steps: Detailed step-by-step instructions
- Roles: Who performs each step
- Tools: Systems/tools used
- Evidence: What evidence is generated
Risks
Risk management identifies, assesses, and mitigates organizational risks.Risk Management
Access risks at/risks:
- Create Risk
- Risk Register
- Risk Monitoring
- Risk Relationships
Navigate to
/risks/create:Risk Identification
- Risk title/description
- Risk category (Security, Privacy, Operational, etc.)
- Risk source (Internal, External, Third-party)
- Affected assets/systems
Risk Assessment
Likelihood (1-5):
- 1: Rare (< 10% probability)
- 2: Unlikely (10-30%)
- 3: Possible (30-50%)
- 4: Likely (50-70%)
- 5: Almost Certain (> 70%)
- 1: Negligible
- 2: Minor
- 3: Moderate
- 4: Major
- 5: Catastrophic
Risk Treatment
Choose treatment strategy:
- Mitigate: Implement controls to reduce risk
- Accept: Accept the risk (document justification)
- Transfer: Transfer to third party (insurance, outsourcing)
- Avoid: Eliminate the risk source
Risk Heat Map
Visualize risk portfolio:Evidence
Evidence collection provides proof of control effectiveness and compliance.Evidence Management
Access evidence at/evidence:
- Upload Evidence
- Evidence Repository
- Evidence Review
- Automated Collection
Navigate to
/evidence/create to upload evidence:Select Evidence Type
- Screenshots
- Log files
- Reports (PDF, DOCX)
- Configuration exports
- Audit reports
- Training certificates
- Meeting minutes
Associate Evidence
Link evidence to:
- Specific controls
- Test procedures
- Compliance frameworks
- Audit requests
- Risks (as proof of mitigation)
Evidence Viewing
The Console supports viewing various file types:- Images: Inline image viewer with zoom
- PDFs: Embedded PDF viewer using react-pdf
- Text/Logs: Syntax-highlighted text viewer
- Documents: Download for external viewing
Cross-Module Relationships
All compliance modules are interconnected:Framework → Controls
Framework → Controls
Frameworks define required controls:
- SOC 2 requires CC6.1 (logical access controls)
- ISO 27001 requires A.9.2.1 (user registration)
Controls → Policies
Controls → Policies
Controls implement policies:
- Access Control policy implemented by authentication control
Policies → Procedures
Policies → Procedures
Procedures operationalize policies:
- Access Control policy executed via User Provisioning procedure
Controls → Risks
Controls → Risks
Controls mitigate risks:
- MFA control mitigates credential theft risk
Controls → Evidence
Controls → Evidence
Evidence proves control effectiveness:
- Screenshot of MFA configuration
- Report of MFA adoption rate
Next Steps
Dashboard
Monitor compliance status
Organizations
Manage multi-organization compliance
Automation
Automate assessments and tasks
API Reference
Integrate compliance data