SPNT

Operational Telemetry Layer

Proof that your controls are actually working.

A security control on paper is not a security control in practice. MFA is configured but not enforced. A network security group has the right rules but an exception was added six months ago. A logging policy exists but the log sink has been paused.

SPNT's Operational Telemetry Layer takes a different approach. It ingests cloud-audit and identity-platform events, classifies each event against the controls those events should be enforcing, and writes a control-health assessment to the substrate. A control that fails enforcement validation immediately affects the priority of every finding it would have mitigated.

The eight telemetry sources

  • AWS CloudTrail — API activity, administrative actions, privilege escalation attempts, enforcement failures.
  • Kubernetes audit log — cluster-level activity, pod creation, role-binding changes, admission control outcomes. Supports webhook delivery and pull-mode for major managed Kubernetes platforms.
  • Microsoft Entra ID — Azure AD sign-in events, conditional access policy outcomes, MFA enforcement records, role assignment changes.
  • GitHub audit log — repository events, organisation policy changes, secret scanning alerts, app installation activity.
  • Okta — identity and access events, MFA bypass attempts, session anomalies, policy enforcement records.
  • Azure Activity Log — resource management operations, policy assignments, subscription-level administrative actions.
  • GCP Cloud Audit Logs — API calls against GCP projects, IAM changes, storage access, compute operations.
  • GitHub Enterprise Server — on-premises GitHub instance audit events for self-hosted deployments.

What "control validation" actually means

The telemetry layer does more than collect events. It evaluates each event against the control model in the substrate.

Example: a conditional access policy is configured to require MFA for all sign-ins to privileged accounts. The classifier checks each sign-in event against that policy. If a privileged sign-in shows MFA was not enforced, the classifier writes a control-health failure to the substrate.

That failure immediately:

  • Affects the priority score of findings that depended on that control as a mitigation.
  • Surfaces in the governance module as an obligation impact — for frameworks that require evidence of enforcement, the failure is recorded.
  • Becomes a signal for the autonomous research engine — a cluster of failures suggests a systemic problem worth investigating.

What SPNT does not do

The telemetry layer is not a SIEM. It does not ingest raw logs at petabyte scale. It does not provide custom correlation-rule authoring or full-text log search.

It normalises selected cloud-audit and identity events into structured substrate records. Organisations with regulatory requirements for raw log retention at scale will run a dedicated log platform alongside SPNT. The two coexist — SPNT handles structured control validation; the log platform handles search and retention.

This is an architectural choice, not a roadmap gap. SPNT trades raw-data breadth for structured-substrate depth.

Tier availability

The Operational Telemetry Layer is available on Enterprise and Sovereign tiers.

See telemetry validation in action

A demonstration showing cloud-audit events flowing into the substrate, control validation running, and priority re-scoring triggered by a control-health failure.