Overview
The Evidence API provides endpoints for managing compliance evidence, including cryptographic verification, regulatory attestations, incident management, and evidence package generation.Base URL
Authentication
All Evidence API endpoints require authentication via thex-continum-key header:
Core Capabilities
Hash Chain Verification
Verify the cryptographic integrity of your compliance records:Regulatory Attestations
View how your signals map to regulatory requirements:Incident Management
Track high-risk incidents through investigation and resolution:Evidence Packages
Generate audit-ready compliance reports:Compliance Policies
Define automated compliance policies:Data Retention
Manage data retention while preserving compliance evidence:Pattern Correlation
Detect patterns across multiple signals:External Auditor API
Grant read-only access to external auditors:Auditor Permissions
READ_SIGNALS: View compliance signalsREAD_ATTESTATIONS: View regulatory mappingsREAD_INCIDENTS: View incident trailsVERIFY_HASH_CHAIN: Verify cryptographic integrityDOWNLOAD_PACKAGES: Download evidence packages
Response Format
Success Response
Error Response
Common Parameters
Date Range
Many endpoints support date range filtering:Framework
Filter by regulatory framework:GDPR, SOC2, ISO27001, HIPAA, CCPA, EU_AI_ACT, PCI_DSS
Pagination
List endpoints support pagination:Rate Limiting
Evidence API endpoints have the same rate limits as other Continum APIs:| Plan | Rate Limit | Burst |
|---|---|---|
| DEV | 10 req/s | 50 |
| PRO | 100 req/s | 500 |
| PRO_MAX | 500 req/s | 2500 |
| ENTERPRISE | Custom | Custom |
Endpoint Categories
Hash Chain
Verify cryptographic integrity
Attestations
Regulatory requirement mappings
Incidents
Track high-risk incidents
Policies
Automated compliance policies
Packages
Generate audit reports
Retention
Data retention management
Correlations
Pattern detection
Auditor API
External auditor access
Use Cases
SOC 2 Type II Audit
Generate a comprehensive evidence package for your SOC 2 audit:GDPR Compliance Verification
Verify GDPR compliance coverage:Incident Response
Track a high-risk incident through resolution:Tamper Detection
Verify that compliance records haven’t been tampered with:Best Practices
Regular Verification
Verify hash chain integrity regularly:- Daily automated checks
- Before generating evidence packages
- During security audits
Evidence Package Generation
Generate evidence packages:- Quarterly for internal reviews
- Annually for compliance audits
- On-demand for security assessments
Incident Management
Establish clear incident workflows:- Immediate response for CRITICAL
- 24-hour response for HIGH
- Segregation of duties for verification
Auditor Access
Grant auditor access securely:- Time-limited tokens
- Minimum required permissions
- Log all auditor activity
Next Steps
Evidence Concepts
Learn about evidence and compliance
Incident Management
Understand incident workflows
Dashboard
View evidence in dashboard
Compliance
Regulatory frameworks

