The auditor's email lands at 4pm Friday: "Please provide evidence of what software was running in your payment service on March 15th." You check your monitoring—logs go back 30 days. It's December. The compliance deadline is Monday.
Without continuous capture:
Define capture schedules in Kubernetes annotations. Evidence is collected automatically, continuously, version-controlled with your code.
metadata:
annotations:
reel.io/schedule: |
# Daily checkpoint for compliance
0 0 * * * | export checkpoint --s3-bucket compliance-evidence
# SBOM after every checkpoint
next | export sbom --format cyclonedx
# Cryptographic inventory weekly
0 0 * * 0 | export cbom$ reel list checkpoints --namespace prod --since 2024-03-01
CHECKPOINT TIMESTAMP S3 LOCATION
chk-payment-20240315-000000 2024-03-15 00:00:00 s3://compliance/chk-payment-20240315-000000.tar
chk-payment-20240316-000000 2024-03-16 00:00:00 s3://compliance/chk-payment-20240316-000000.tar
...Checkpoints export to S3 with Object Lock. Timestamps are verifiable. Evidence cannot be modified after the fact.
SBOM, CBOM, and checkpoint data available for any captured point in time.
$ reel export sbom --checkpoint chk-payment-20240315-000000
SBOM exported: sbom-payment-20240315-000000.json
Format: CycloneDX 1.5
Packages: 247
Vulnerabilities: 0 CRITICAL, 2 HIGH, 5 MEDIUMWhen the auditor asks "what was running on March 15th," you have:
Audit finding: "Control verified with comprehensive evidence."
Coming soon. Deploys in minutes. Join the waitlist for early access.