Roadmap
Build the narrow corridor first, then harden it in public.
The sequence matters. OpenCompliance is strongest if it goes from formal semantics to deterministic verification, then to tamper-evident artifact handling, and only after that to broader publication and continuous operation.
1
Semantics foundation
Publish the first open Lean 4 control-spec library, the three-tier control classification model, and a first exact-anchor review pilot for the SOC 2 Security plus ISO 27001 technical overlap corridor, then widen the public review layer to GDPR, IRAP, Cyber Essentials, NCSC CAF, NIST, and the first AI-governance frameworks without faking implementation that does not exist yet.
2
Evidence and interchange
Define the typed evidence-claim schema, actor ontology, and OSCAL-native ingest path for catalogs, profiles, mappings, and assessment-style artifacts.
3
Deterministic verification
Ship the Lean proof runner, trust-surface report, and single Verify flow that returns a certificate or typed punch-list for the same evidence every time.
4
Trust hardening
Add canonical artifact envelopes, signatures, transparency logging, reproducible replay bundles, and witness receipts for exact-match reruns.
5
Live evidence and lifecycle
Connect real evidence sources, track freshness, detect compliance drift, and handle certificate revocation or re-verification when state changes. The current synthetic lifecycle pack already demonstrates the fail-closed shape and the delta-recheck plan.
6
Public proof commons
Split docs, open specs, and public example fixtures into separate public bundles so the semantic layer can be inspected and reused in the open.