Cover Letter
This document provides an investor-level view of CACCA (Continuous Audit, Continuous Compliance & Assurance): what problem we solve, how our system operates, where we win, the market we are addressing, and how we plan to execute. It is intended to support diligence conversations by presenting our product, commercial approach, and governance posture in one place.
What this document covers
a system-driven compliance loop that connects policy approval and statement‑level asset implementation with scheduled tickets, system‑generated audits (with peer review), findings, automatic risk, and a real-time dashboard for posture. SaaS Bundle (turnkey), SaaS Hybrid (integrated with existing tools like ticketing/CMDB/IAM), and Enterprise On‑Prem (customer‑controlled deployment). who we sell to, how we generate demand, and how pilots convert to production with a Mutual Action Plan. Market, competition, and traction: the size of the opportunity, how we differentiate, and our early proof points. Start with Problem and Why Now for market context; move to Solution and Product Modules to understand the operating loop; then review Differentiation and Delivery Models, followed by Market Size, GTM, and Financial Plan. Appendices include product screenshots, sample artifacts, and legal/governance materials. Executive Summary
CACCA is a continuous compliance platform that converts approved policies into provable implementation, system‑driven audits, automatic risks, and real‑time dashboards—keeping enterprises always audit‑ready.
Available as SaaS Bundle, SaaS Hybrid, and Enterprise On‑Prem to match speed, integration depth, and data‑residency needs across SaaS/Software, FinTech/Payments, BFSI, IT/ITES, Healthcare, and Manufacturing.
Points to add
Why now:
Compliance is moving to “always‑on” expectations—live evidence, maker‑checker governance, and audit logs by design. CACCA unifies policies, assets, tickets, audits, findings, and risks into one operating layer.
Who we serve:
Mid‑to‑large, regulated and fast‑moving organizations that need traceability from policy to asset, credible On‑Prem/Hybrid options, and measurable audit readiness without tool sprawl.
What’s different:
Policy→asset traceability, system‑generated audits derived from approved policies (with peer review), automatic risk on partial/not‑implemented controls, and SLA discipline via ticket mirroring—plus a credible On‑Prem option for regulated buyers.
Implementation and success:
A phased onboarding (Assessment → Configuration/Integrations → Pilot → Training → Go‑Live), 24/7 support, and dedicated Customer Success ensure fast time‑to‑value and measurable readiness without disrupting existing tools.
Market and investment snapshot:
Expanding compliance automation category with strong India/APAC beachhead and global potential; recurring revenue across subscriptions, integrations, and enterprise licenses. Detailed figures are provided later with [TBD] placeholders where numbers are pending.
Inside this document:
Problem → Why Now → Solution → Product → Models/Industries → Why We Win → Competition → Market Size (bottoms‑up) → Traction → GTM → Business Model → Roadmap/Moat → Team → Ask.
The Problem
The Problem Most enterprises still manage compliance episodically and by hand. Policies get approved but remain stuck in documents, not consistently mapped to the assets they govern. Audits are point‑in‑time, evidence is assembled late, and the operational truth—tickets, findings, and risks—sits scattered across tools. Leaders infer posture from stale artifacts instead of a live operating picture, which fuels last‑minute audit scrambles.
Episodic, manual, fragmented Policies in documents; weak linkage to assets and control procedures. Point‑in‑time audits; evidence re‑created manually and late. No single, real‑time posture Tickets, findings, and risks scattered across helpdesk and trackers. Leadership lacks a current view tied to owners and SLAs. Governance gaps raise risk Inconsistent maker‑checker and peer review; variable evidence quality. Opaque ownership; SLA breaches surface only under deadline pressure. Late discovery, slow remediation Non‑compliance isn’t systematically elevated to risk with accountable owners. Gaps emerge during audits/incidents, not in day‑to‑day operations. Teams can’t quickly answer what’s implemented where and who owns remediation. No reliable map from approved policy statements to specific assets and procedures. Net effect: without a unified operating layer from policy approval to asset‑level implementation, evidence, and risk closure, compliance stays reactive, labor‑intensive, and prone to last‑minute surprises—at the very moment regulators expect continuous assurance.
Why Now
Regulators and boards have moved from periodic attestations to continuous assurance. Standards like ISO 27001, PCI DSS, HIPAA, GDPR, and emerging local privacy laws increasingly expect ongoing control operation and live, retrievable evidence—plus defensible audit trails with maker‑checker governance.
At the same time, API‑first enterprise stacks now emit approvals and logs that make auditability‑by‑design practical, if organizations can orchestrate signals across tools.
Regulatory shift to continuous assurance Standards (ISO 27001, PCI DSS, HIPAA, GDPR, and local privacy laws) increasingly expect ongoing control operation and live, retrievable evidence—not annual prep. Auditability by design is finally practical API‑first ecosystems (ticketing, asset, CMDB, IAM/SSO/MFA) produce approvals and audit logs that can trigger system‑generated tasks and audits, enable peer review, and centralize findings. Tool sprawl needs a unifying operating layer Policies, assets, tickets, audits, findings, and risks live across separate tools; no single place shows live posture or ownership. Rising compliance cost and real‑time expectations Manual compilation across silos consumes weeks of high‑cost effort and consulting spend. Expanding cyber and privacy risk surface Cloud/SaaS adoption, remote work, and third‑party dependencies multiply assets, identities, and controls to evidence. Solution: What CACCA does
CACCA is a continuous compliance operating layer that turns policy approval into real execution, evidence, and accountable risk closure. It connects policy lifecycle, asset‑level implementation, tickets, audits, findings, and risks—so posture is always live and audit‑ready.
End‑to‑end policy lifecycle Draft → Review → Approval → Publish with maker‑checker governance and versioning. Policy statements mapped to standards and asset categories. Policy→asset implementation mapping Statement‑level implementation status per asset. Documented procedures and clear ownership for remediation. System‑driven tasks and audits Schedules derived from approved policies automatically create tasks/tickets. Open/Closed mirroring from external helpdesk; SLA breaches surfaced. Audits and questions generated from live policy definitions; no manual re‑creation. Centralized findings and automatic risk Findings recorded in a single register with peer review for evidence quality. Partial/not‑implemented and non‑compliance auto‑create risks with full lifecycle: Identification → Analysis → Treatment → Post‑treatment → Acceptance → Closure. Risks linked to specific assets and policy statements with accountable owners. Real‑time dashboards and posture Organization Level Risk score (pointer reflects highest open risk) and risk level status. Policy workflow status and policy/asset implementation status. Audit findings (Major/Minor NC, Observations) with open/closed tracking. SLA‑breached tickets and “running risk” by policy to prioritize action. In effect, CACCA operationalizes compliance: approvals generate work, audits are system‑driven, evidence is reviewable by design, and gaps become managed risks with owners and SLAs—keeping organizations continuously audit‑ready without the scramble.
Product Heros (Modules)
CACCA’s product is organized around a live operating layer for compliance: policy lifecycle, asset‑level implementation, tickets, audits, findings, and risks all tie back to a single view of posture. Each module below maps to a visible object and workflow, ensuring auditability, ownership, and continuous readiness without tool sprawl.
Indicators: organizational risk score (pointer to highest open risk); risk level/status counts; policy workflow status (Approved/Draft/In Review/Waiting for Approval); policy→asset implementation status (Implemented/Partial/Not); audit findings by category and open/closed; SLA‑breached tickets; “running risk” (SLA‑violated tickets per policy with trend). What it includes: 30+ templates aligned to standards; versioning; maker‑checker approvals; mapping to standards and asset categories. Why it matters: enforces governance and creates the basis for system‑driven tasks/audits and evidence‑by‑design. What it includes: statement‑level policy implementation status per asset (Implemented / Partially Implemented / Not Implemented) with documented procedures and ownership. Why it matters: surfaces gaps early; “Partial/Not Implemented” can trigger risks automatically for accountable closure. What it includes: system‑generated audits and questions from approved policies; findings register; peer review; audit and findings reports; ability to register external audit findings. Why it matters: turns approved policy into scheduled, reviewable audits—reducing manual prep and improving evidence quality. What it includes: schedule‑based task creation from policy definitions; push to external helpdesk; Open/Closed mirroring; role‑based ownership; SLA breach visibility. Why it matters: aligns day‑to‑day work with compliance intent and makes SLA discipline visible in one place. What it includes: automatic and manual risks; full lifecycle (Identification → Analysis → Treatment → Post‑treatment → Acceptance → Closure); linkage to assets and policy statements; accountable owners. Why it matters: elevates non‑compliance into managed, owned risks with traceable treatment and closure. What it includes: categories across end‑user devices, computing, networking, security devices, infrastructure apps, business apps, general, and components; manual/API ingestion; ownership and relationships. Why it matters: provides the map from policy statements to real assets and people—foundation for traceability and evidence. (👆 Might have to rephrase the above into a high level note and add screenshots from the tool)
How it Works (The Compliance Loop)
CACCA operationalizes compliance by turning policy approval into scheduled work, system‑generated audits, accountable risk, and a live dashboard of posture. The loop below illustrates how approvals become implementation, evidence, and closure—without the audit scramble.
Policy approval and mapping Maker‑checker workflow: Draft → Review → Approval → Publish with versioning. Approved policy statements mapped to standards (e.g., ISO/PCI) and relevant asset categories. Scheduled tasks/tickets from policy System‑driven schedules generate tasks/tickets aligned to policy definitions. Open/Closed mirrored from external helpdesk; SLA breaches surfaced to prioritize work. Per schedules, the system builds audits and question sets from approved policies. Audits align to the live policy baseline—no manual re‑creation of checklists. Findings capture and peer review Auditors record findings in a centralized register (Major/Minor NC, Observation). Peer review tightens evidence quality; reports available by audit or across audits. Automatic risk creation and lifecycle “Partially Implemented” / “Not Implemented” and non‑compliance auto‑create risks. Full lifecycle: Identification → Analysis → Treatment → Post‑treatment → Acceptance → Closure, with owners and asset/policy linkage. Real‑time posture on the dashboard Risk score (pointer to highest open risk) and risk level/status counts. Policy workflow status and policy→asset implementation status. Audit findings with open/closed tracking; SLA‑breached tickets; “running risk” by policy. Net effect: Approvals generate work, audits and evidence are system‑driven, deviations become owned risks, and leadership sees a single, live operating picture—keeping the organization continuously audit‑ready.
Delivery Models & Target Industries
CACCA is offered in three levels to meet distinct buyer constraints without compromise: ASSURE for rapid readiness, SHIELD for integrated assurance in existing toolchains, and CORE for customer‑controlled deployments. This packaging reduces time‑to‑value, aligns with procurement and governance expectations, and creates a durable expansion motion as customers’ compliance sophistication deepens.
CACCA Assure (SaaS Bundle)
CACCA Shield (SaaS Hybrid)
CACCA Core (Enterprise - On prem)
Which Model to choose & When
Choose ASSURE when speed and simplicity matter most, and you prefer a turnkey stack without external ITSM/CMDB/IAM. Choose SHIELD when you already run Jira/ServiceNow/Okta/CMDB/IAM and want CACCA to orchestrate policy→tickets→audits→risk with governance and SLA discipline. Choose CORE when procurement, data residency, or security policy requires customer‑controlled deployment and deeper enterprise integrations. Target Industries
Banking/Financial Services (BFSI)
Competitive Landscape
The compliance automation market has scaled rapidly, led by well-funded U.S. players and fast-growing India-born vendors. These solutions have proven demand for automated evidence, SOC 2/ISO workflows, and compliance reporting at scale.
Yet, most offerings remain framework-centric and SaaS-first, with limited policy→asset traceability, inconsistent SLA discipline across tickets, and few credible options for regulated on‑premise deployments.
This leaves an opening for a unified operating layer that connects policy approval to asset‑level implementation, system‑generated audits with peer review, automatic risk creation, and a real on‑prem path for BFSI/FinTech/Manufacturing.
Market Size
We quantify the English‑speaking markets across four focus industries: IT/ITES & Software, Financial Services & Banking, Healthcare, and Manufacturing, restricted to companies with turnover above 50/100 crore. Sizing is presented as three lenses: TAM (all qualified accounts), SAM (near‑term serviceable portion based on focus and reach), and SOM (obtainable in the next 24–36 months based on conversion capacity).
Total qualified accounts across listed countries: 403,805. Largest country opportunities by accounts: Industry distribution overall: IT/ITES & Software (83,101), Financial Services & Banking (84,355), Healthcare (70,534), This mix favors our Bundle/Hybrid motions in IT/ITES & Software and BFSI/FinTech, with meaningful Hybrid/Core potential where Manufacturing and regulated Healthcare are concentrated.
Market Opportunity Breakdown
Market by Industry Breakdown
Financial Services & Banking
Why We Win
To prepare a differentiation mapped against competitor features
Traction
Go-to-market Strategy
Business Model & Unit Economics
Technology Infrastructure
Implementation & Customer Success
CACCA deploys with a structured, measurable program that turns policy approval into day‑to‑day execution and continuous assurance. The focus is fast time‑to‑value, clear ownership, auditability by design, and ongoing optimization—without disrupting existing tools.
Onboarding at a glance (typically 4–6 weeks; complexity-dependent) Assessment & Planning: confirm frameworks and scope; inventory policies/assets; define integrations and success criteria. Configuration & Integrations: map policy statements to standards and asset categories; connect ticketing/CMDB/IAM; enable maker‑checker and audit logs. Pilot & Validation: run the loop on a limited scope; validate ticket mirroring (Open/Closed), audit question sets, and findings capture; calibrate risk auto‑creation. Training & Go‑Live: role‑based enablement for admins, auditors, owners; finalize dashboards; handover with a Mutual Action Plan (MAP). Documented success criteria: day‑30/60/90 outcomes, executive sponsor, decision path, risks/assumptions. Cadence: weekly working session during onboarding; monthly adoption review; quarterly business review (QBR) post go‑live. Adoption scorecard (tracked in QBRs) Policy coverage: # imported/approved; % statements mapped to assets. Ticket health: % Open/Closed mirrored; SLA‑breach trend; “running risk” by policy. Audits/findings: # system‑generated audits executed; finding closure time; peer‑review completion. Risk lifecycle: % risks with owners; treatment progress; closure within target SLA. 30/60/90 outcomes (illustrative targets to align in MAP) Day‑30: first policies approved (maker‑checker), assets mapped for priority categories, first scheduled audits generated, ticket mirroring live. Day‑60: majority of priority statements mapped; initial findings closed; auto‑risk functioning for Partial/Not Implemented; baseline dashboard adopted in weekly ops. Day‑90: reduced time‑to‑readiness vs. baseline; SLA breach visibility normalized; risk closure rate trending to target; executive dashboard in monthly governance. Governance and security defaults Maker‑checker approvals; audit logs on key actions; least‑privilege, API‑based integrations; data‑residency options (SaaS, Hybrid, On‑Prem). Connect to existing ticketing/CMDB/IAM to avoid rip‑and‑replace; mirror Open/Closed only; surface SLA breaches; keep systems of record authoritative. Evidence and review cadence System‑generated audits and question sets from approved policies; centralized findings; peer review to improve evidence quality pre‑reporting. Dedicated Customer Success Manager to guide adoption and optimization. 24/7 technical support via ticketing, chat, and email; periodic health checks; release briefings and enablement for new features. Use dashboard trends (risk score, policy/asset status, SLA breaches, audit findings) to prioritize work. Quarterly tuning of schedules, mappings, and ownership to improve closure times and reduce audit prep effort. Outcome: rapid go‑live, measurable adoption, and continuous readiness. Approvals generate work, audits and evidence are system‑driven, deviations become owned risks, and leadership runs on a live posture—sustained through a CSM‑led MAP, scorecards, and QBRs.
The Soffit Advantage
Soffit, CACCA’s parent company, provides the distribution, credibility, and execution backbone to deliver CACCA at enterprise scale—especially for Hybrid and On‑Prem buyers. With multi‑decade delivery heritage and ISO 27001 certification, Soffit shortens timelines, de‑risks integrations, and strengthens buyer confidence.
Distribution and delivery strength 800+ clients, 900+ projects across a dozen countries; ~two decades of IT/security delivery; ISO 27001 certification. Managed SOC (mSOC), NOC, IT managed services, technology integration, security testing, and advisory reinforce CACCA implementations at scale. Process‑driven operations with governance and quality practices. Security‑by‑design posture with audit readiness and advisory offerings aligned to regulated‑buyer expectations. Practical impact on CACCA Faster Hybrid/On‑Prem deployments with reference architectures and proven runbooks. Bench strength for integrations (ticketing/CMDB/IAM and adjacent systems) and on‑site execution where required. Trusted enterprise relationships that open doors and de‑risk complex programs. Team & Advisors
Leadership profiles