Created by Claudiu Tabac - © 2026
This material is open for educational and research use. Commercial use without explicit permission from the author is not allowed.
Evidence Library (ECIL-EL)
The comprehensive framework for understanding, categorizing, and interpreting security evidence across enterprise capabilities and regulatory requirements.
Redefining Security Evidence
Traditional Approach
In conventional security frameworks, evidence functions as checklist artifacts-discrete compliance attachments collected to satisfy auditor requirements. This approach creates fragmented documentation silos where the same operational reality must be proven repeatedly across different frameworks.
Organizations waste countless hours regenerating similar evidence in slightly different formats, driven by framework-specific requirements rather than actual security capabilities.
ECIL Philosophy
ECIL transforms this paradigm by treating evidence as proof of capability existence and effectiveness. Rather than collecting documentation to check boxes, ECIL anchors evidence to real, operating security capabilities that demonstrate genuine organizational maturity.
The same evidence artifact can elegantly support multiple regulatory interpretations when it authentically demonstrates a functioning security capability, eliminating redundant documentation.
Four Pillars of the Evidence Library
Shared Language
Establish consistent terminology and classification standards for security evidence across all organizational units, ensuring auditors, security teams, and compliance professionals speak the same language when discussing proof of controls.
Capability Linkage
Connect evidence directly to underlying security capabilities rather than isolated control statements, creating meaningful relationships between documentation and actual operational security functions that protect the enterprise.
Cross-Framework Reuse
Enable intelligent evidence reuse across regulatory lenses including ISO 27001, NIS2, DORA, GDPR, and SOC 2, recognizing that different frameworks often require the same fundamental proof presented through different evaluation criteria.
Sprawl Prevention
Eliminate evidence proliferation driven by framework-specific checklists, preventing the exponential growth of redundant documentation that burdens security teams and obscures genuine capability assessment with administrative overhead.
Evidence Categories: A Structured Taxonomy
ECIL organizes evidence into six stable, capability-aligned categories that remain consistent across all regulatory mapping and lens views. These categories reflect the fundamental types of proof required to demonstrate enterprise security maturity.
1
Governance & Policy Evidence
Formal documentation demonstrating organizational ownership, clear accountability structures, and executive decision-making frameworks. Includes security policies, governance charters, committee minutes, and authority matrices that prove strategic oversight exists.
2
Technical Control Evidence
Artifacts proving the existence, proper configuration, and operational status of technical security mechanisms. Examples include firewall rule sets, encryption configurations, access control matrices, and security tool deployment documentation.
3
Operational Process Evidence
Documentation of repeatable security workflows and standardized procedures. Includes process maps, runbooks, standard operating procedures, training records, and evidence of consistent execution across security operations.
4
Monitoring & Detection Evidence
Proof of continuous visibility, comprehensive logging infrastructure, and active threat detection capabilities. Encompasses SIEM configurations, log retention policies, alert rules, detection coverage reports, and monitoring dashboards.
5
Incident & Response Evidence
Demonstration of preparedness planning, effective response execution, and recovery capability. Includes incident response plans, tabletop exercise records, post-incident reviews, communication protocols, and recovery time documentation.
6
Third-Party & Supplier Evidence
Documentation proving governance and oversight of external dependencies and vendor relationships. Covers vendor risk assessments, SLA monitoring, contract security clauses, audit rights, and supply chain security controls.
Evidence as Capability Proof

Core Principle: Evidence is never interpreted in isolation from the capability it supports. Context determines meaning and regulatory applicability.
1
Existence Proof
Evidence must first demonstrate that a security capability actually exists within the organization-not just as a planned initiative or documented policy, but as an implemented, functioning component of the security architecture.
2
Operational Proof
Beyond mere existence, evidence must show how the capability operates in practice. This includes configuration details, workflow execution, integration with other systems, and evidence of routine operational effectiveness.
3
Governance Proof
Finally, evidence must demonstrate that appropriate oversight and accountability structures surround the capability. This includes management review, exception handling, continuous improvement, and alignment with organizational risk appetite.
This three-dimensional evaluation ensures that evidence represents genuine security capability rather than superficial compliance theater. Each piece of evidence is assessed for completeness across all three dimensions before being considered sufficient proof.
Cross-Framework Evidence Mapping
The Regulatory Reality
Modern enterprises face overlapping regulatory requirements from ISO 27001, NIS2, DORA, GDPR, SOC 2, and numerous other frameworks. Traditional approaches treat each framework as requiring unique evidence sets, creating massive documentation overhead.
ESL recognizes a fundamental truth: regulatory frameworks don't require unique evidence types-they apply different evaluation criteria to the same underlying proof.
Evidence Library Advantages
  • Single Source of Truth: Map one evidence artifact to multiple regulatory lenses simultaneously, eliminating redundant documentation efforts
  • Transparent Reasoning: Clearly explain why the same evidence satisfies overlapping requirements across frameworks
  • Reduced Duplication: Eliminate artificial evidence multiplication driven by framework-specific silos and checklist mentality
  • Faster Audits: Enable auditors to quickly understand evidence relationships and coverage across multiple compliance domains
  • Strategic Clarity: Help leadership understand actual security capabilities rather than drowning in framework-specific documentation
Evidence Reuse in Practice
A single comprehensive evidence artifact can satisfy multiple regulatory requirements when it demonstrates a genuine security capability. Consider this practical example:
Source Evidence
Incident Response Plan - comprehensive documentation including detection procedures, escalation paths, communication protocols, recovery steps, and post-incident review processes.
ISO 27001 View
Satisfies Annex A.16 requirements for information security incident management, demonstrating planned procedures and responsibilities.
NIS2 View
Addresses Article 21 incident handling requirements, proving capability to detect, respond to, and recover from cybersecurity incidents.
DORA View
Meets ICT incident management obligations under Articles 17-19, showing structured response and recovery capabilities for digital operational resilience.
SOC 2 View
Supports Availability and Confidentiality criteria by demonstrating systematic approach to incident response and business continuity.
This single evidence artifact serves five regulatory purposes because it proves a real capability exists. The Evidence Library enables this intelligent reuse while maintaining full audit traceability.
Navigating the Evidence Library
01
Understanding Evidence Types
Begin by familiarizing yourself with the six evidence categories and their definitions. Recognize which types of proof fall into each category and how they relate to your organization's security capabilities.
02
Mapping Evidence to Capabilities
Identify the underlying security capabilities that your evidence demonstrates. Connect documentation to actual operational functions rather than isolated control statements or framework requirements.
03
Exploring Cross-Framework Coverage
Use ECIL mapping views to understand how your evidence supports multiple regulatory requirements. Identify opportunities to reduce redundant documentation through intelligent evidence reuse.
04
Validating Regulatory Alignment
Leverage the Evidence Library to validate that your proof meets the specific evaluation criteria required by each applicable regulatory lens while maintaining connection to core capabilities.
Key Mapping Resources
Access these essential mapping views to understand evidence coverage, trace regulatory alignment, and validate capability proof across your security program.
Capability → Regulation Mapping
Explore how security capabilities map to regulatory requirements across ISO 27001, NIS2, DORA, GDPR, and SOC 2. Understand which capabilities satisfy multiple framework obligations and identify coverage gaps.
Evidence Coverage Mapping
Visualize which evidence artifacts support specific capabilities and regulatory requirements. Identify opportunities for evidence reuse and detect areas where additional proof may strengthen your security narrative.
Grounding Security in Reality
The Evidence Library ensures that ECIL remains grounded in reality. It connects interpretation to proof, governance to operation, and regulation to demonstrable enterprise security capability-without reducing security to document collection.
From Documents to Capabilities
ECIL shifts the paradigm from collecting compliance documents to proving operational security capabilities that actually protect the enterprise.
From Silos to Integration
Evidence becomes a bridge connecting disparate regulatory frameworks through shared proof of genuine security maturity and effectiveness.
From Burden to Strategy
Security evidence transforms from an audit burden into strategic intelligence that informs risk decisions and capability investments.

Created by Claudiu Tabac — © 2026
This material is open for educational and research use. Commercial use without explicit permission from the author is not allowed.