Now supporting CMMC 2.0, NIST 800-171, EU AI Act, and Colorado AI Act

Compliance Evidence That Proves Itself

Upload artifacts. Get KMS-signed receipts. Share verification links assessors can check independently. Export evidence packages across every framework you need — from one vault.

CMMC 2.0NIST 800-171EU AI ActColorado AI Act

Compliance Costs Too Much Because Evidence Is a Mess

Your team collects screenshots, policies, scan reports, and training records across shared drives, ticketing systems, and email threads. When an assessor asks for proof, you spend weeks assembling a binder. When a buyer asks “how do you govern your AI?”, you send a PDF that nobody can verify.

The result: delayed audits, repeated evidence requests, and no way for anyone outside your organization to independently confirm that your evidence hasn't been altered.

Evidence isn't a documentation problem. It's a trust problem.

One Vault. Every Framework. Verifiable Receipts.

Solymus stores your compliance evidence, signs every artifact with AWS KMS, maps it to controls in your selected frameworks, and generates shareable verification links anyone can check — without accessing your systems.

One Engine

Upload evidence once. Enable framework packs to map artifacts to the controls that matter to you.

Cryptographic Receipts

Every artifact gets a SHA-256 hash, a KMS signature, and a position in a Merkle chain. Any modification is detectable.

Verifiable by Anyone

Share a verification link with your assessor, buyer, or regulator. They confirm integrity independently.

Exportable Packages

Generate an evidence index with per-artifact verification URLs. Hand it to your auditor as a self-verifying binder.

Four Steps to Audit-Ready Evidence

1

Upload

Upload policies, screenshots, scan reports, or training records. PDF, Office docs, images, text. Each upload goes to encrypted storage (S3 with SSE-KMS).

2

Sign

Solymus computes a SHA-256 hash, signs it with AWS KMS (ECDSA_SHA_256), and links it to a Merkle chain. You get a tamper-evident receipt with a unique event ID.

3

Map

Your framework pack maps the artifact to relevant controls automatically. Policy documents map to AC-1, SC-1. Identity configs map to AC-2, IA-2. Adjust or tag as needed.

4

Export & Share

Generate an evidence index — every artifact, its hash, control mappings, and a verification URL. Share the package or individual links with anyone.

Enable the Frameworks You Need. Add More Anytime.

Framework packs configure how your evidence is organized, which controls artifacts map to, and what your exports look like. Same vault, same receipts, different lenses.

CMMC 2.0 / NIST 800-171

For defense contractors, subcontractors, and cloud providers handling CUI. Maps artifacts to CMMC Level 2 practices and NIST 800-171 controls. Exports produce evidence indexes aligned to assessor expectations.

CMMC Level 2NIST 800-171DFARS 7012

AI Governance

For organizations building or deploying AI systems. Maps artifacts to EU AI Act requirements and Colorado AI Act obligations. Designed for teams responding to buyer questionnaires, regulatory inquiries, or internal governance reviews.

EU AI ActColorado AI ActNIST AI RMF

Every workspace can enable one or both packs. Control mappings and export templates adjust automatically. Your underlying evidence — and its cryptographic receipts — stays the same regardless of which packs are active.

Evidence Packages Assessors Can Actually Use

Your evidence index export includes:

Artifact metadataName, upload date, and evidence type
SHA-256 content hashCryptographic fingerprint of the artifact contents
Mapped controlsPer your enabled framework packs
Verification URLA link the assessor can open to independently confirm the artifact's signature and chain linkage
Export metadataWorkspace, generation date, artifact count

Assessors get a structured index they can walk through artifact by artifact, clicking verification links to confirm integrity without requesting access to your systems.

Verification Links Anyone Can Check

Every artifact in Solymus has a verification URL. When someone opens that link, the system:

1
Retrieves the KMS signature for the artifact's event
2
Verifies the signature against the stored hash
3
Confirms the event's position in the Merkle chain
4
Displays the result: valid or tampered

No login required. No access to your workspace. The verifier sees the artifact's hash, signature status, and chain linkage — not the artifact contents. You decide what to share; the verification link proves it hasn't changed.

Built on AWS Cryptographic Infrastructure

KMS Signing

Every receipt is signed with ECDSA_SHA_256 using a dedicated AWS KMS key. Signing keys are never exported.

Encrypted Storage

Artifacts are stored in S3 with SSE-KMS encryption at rest.

Merkle Chain

Events are linked in a hash chain with daily attestations producing a Merkle root. Modifying any event breaks the chain.

Workspace Isolation

Each workspace has its own artifacts, exports, API keys, and access controls. No cross-workspace data leakage.

Tamper-Evident

We make modifications detectable. We do not claim modifications are impossible. That distinction matters, and we respect it.

Connect Your Evidence Sources

We're building collectors to pull evidence directly from the systems you already use. Today, upload artifacts manually or via API.

Microsoft 365 / Entra IDComing Soon
AWS (Commercial & GovCloud)Coming Soon
Endpoint ManagementComing Soon

Simple Pricing. Start Free.

Starter

Free

No credit card required

  • 1,000 events/month
  • 7-day retention
  • 1 framework pack
  • Verification links
  • Evidence exports
  • API access
Get Started Free
Most Popular

Pro

Contact Sales

For active compliance programs

  • 100,000 events/month
  • 365-day retention
  • All framework packs
  • Priority support
  • Verification links
  • Evidence exports
Contact Sales

Enterprise

Contact Sales

For large organizations

  • 1,000,000 events/month
  • Unlimited retention
  • All framework packs
  • Dedicated support
  • Custom integrations
  • Multi-workspace
Contact Sales

All plans include: KMS-signed receipts, shareable verification links, exportable evidence indexes, workspace isolation, and API access.

What We Do & What We Don't

What Solymus does

  • Organizes compliance evidence in a structured, searchable vault
  • Signs every artifact with AWS KMS and links it to a verifiable hash chain
  • Maps artifacts to controls in your selected frameworks
  • Generates exportable evidence packages with per-artifact verification URLs
  • Provides shareable verification links for independent third-party confirmation

What Solymus does not do

  • Guarantee certification, authorization, or compliance outcomes
  • Replace legal counsel, assessors, or certification bodies
  • Make legal claims about liability reduction or audit pass rates
  • Serve as a complete GRC platform (we focus on evidence and verification)

We support audit readiness by making your evidence organized, signed, and independently verifiable. Compliance outcomes depend on your controls, your assessor, and your organization's practices.

Frequently Asked Questions

Your Evidence Should Speak for Itself

Upload your first artifact. Get a signed receipt. Share a verification link. See what audit-ready evidence looks like when it's cryptographically sealed and independently verifiable.