How SIFTR works

Who this is for

Designed for cyber security, assurance, and governance teams working with CAF.

How this works:

Upload your existing CAF artefacts

Policies, strategies, risk registers, governance documents nothing new to write.

SIFTR extracts evidence only

Documents are parsed and reviewed using quote-backed extraction. No inference. No assumptions. No content added.

Mapped to CAF outcomes

Each CAF outcome is assessed using direct quoted evidence from your documents.

Clear coverage view

Outcomes are shown as Strong, Partial, or None, with supporting quotes and source references.

Humans remain in control

Outputs support discussion and review. Final judgement always remains with your team.

For the current beta, SIFTR supports PDF uploads only.

Practical guidance, platform updates, and regulatory insight from SIFTR.