Skip to content

complyform assess

Map scanned resources to framework controls and produce compliance findings.

Terminal window
complyform assess [options]
FlagTypeDefaultDescription
--frameworksstringComma-separated framework IDs to assess against
--formatjson|terminal|html|sarifterminalOutput format. SARIF = v2.1.0 (all tiers). HTML requires Pro+.
--severitycritical|high|allallFilter findings by minimum severity
--attestboolfalseProduce in-toto v1 attestation. Unsigned at all tiers. Ed25519-signed at Team+ (SPEC-017).
--attest-outputpath./attestation.jsonAttestation output path
--cross-validateboolfalseCross-validate against cloud-native CSPM tools (SCC, Security Hub, Defender). Team+.
--iam-analysisboolfalseInclude IAM least-privilege analysis. Team+.
--estimate-costboolfalseInclude compliance cost impact estimation. Team+.
--explainboolfalseAppend deterministic explanations for FAIL findings. Add --ai for AI-enhanced (Pro+). (SPEC-003)
--no-upgrade-hintsboolfalseSuppress framework overlap upsell section (SPEC-004)

Assess against SOC 2:

Terminal window
complyform assess --frameworks=soc2

JSON output for CI pipelines:

Terminal window
complyform assess --frameworks=soc2 --format=json

SARIF for GitHub Code Scanning:

Terminal window
complyform assess --frameworks=soc2 --format=sarif

Multi-framework assessment:

Terminal window
complyform assess --frameworks=soc2,hipaa,iso27001

Full cloud intelligence stack (Team+):

Terminal window
complyform assess --frameworks=soc2 --cross-validate --iam-analysis --estimate-cost
  • scan — Discover resources before assessment
  • remediate — Generate patches for failing controls
  • report — Generate compliance reports
  • export — Export results to GRC platforms