Tier 2 data centre operator, mocked walkthrough
From OT and IT exports to a signed CIRMP evidence pack, in four steps.
A group CISO can walk a quarterly section 30AC cycle in under two minutes here. The data is mocked. The shape is the artefact the board will sign and the auditor will read. Built for a Tier 2 responsible entity in the data centre sector.
Ingest the artefacts your tools already export
Artefact ingestion adapter library
8 artefacts ingested. 0 rejected. Schema validated.
- OT
Dragos
dragos_asset_posture_2026Q1.json
Cyber and information security
Ingested - OT
Claroty CTD
claroty_exposure_register_2026Q1.csv
Cyber and information security
Ingested - IT
ServiceNow IRM
snow_irm_control_evidence_export.csv
Cyber and information security
Ingested - IT
Microsoft Sentinel
sentinel_posture_summary_apr_2026.json
Cyber and information security
Validated - IT
CrowdStrike Falcon
falcon_posture_export_apr_2026.csv
Cyber and information security
Validated - HRIS
HRIS (Workday)
hris_privileged_access_review_q1.csv
Personnel
Ingested - Vendor
Vendor register
material_supplier_register_2026.xlsx
Supply chain
Ingested - OT
Site security
ot_segmentation_iec62443_zones.pdf
Physical and natural
Ingested
No live telemetry tap. No agent on the plant floor. The agent reads what your existing OT and IT tooling already produces. Each artefact is hashed, validated against the vendor's documented export format, and screened for prompt injection before it enters the agent's reasoning context.
Classify across the four CIRMP hazard domains
CIRMP Rules 2023, four-hazard coverage
Cyber and information security
24 artefacts mapped
ASD Essential Eight ML2 baseline. ISM controls mapped. Sentinel and CrowdStrike posture cross-referenced against the Dragos OT asset register.
Personnel
6 artefacts mapped
Privileged access review evidence ingested from Workday. ISM personnel security controls mapped at lightweight depth (Phase 1 commitment).
Supply chain
11 artefacts mapped
Section 30CB material supplier declarations cross-checked. One supplier flagged as missing the FOCI declaration. Surfaced for human review.
Physical and natural
9 artefacts mapped
IEC 62443 zones and conduits ingested. Site security evidence cross-referenced against the asset register. Bushfire and flood treatment plans on file.
Assemble the CIRMP evidence pack draft
Section 30AC pack draft, excerpt
Three control statements, with cited reasoning
Every statement carries a control reference, an artefact hash and a reasoning trace.
CIRMP Rules 2023, s 8(1)(a)(i). Cyber and information security framework.
MetSentinel posture summary, Apr 2026 (sha256:9b3a...e21d)
The responsible entity has adopted ASD Essential Eight as its established framework. Sentinel posture export confirms ML2 across patch application, application control and configuration of Microsoft Office macros. Two controls at ML1 (user application hardening, multi-factor authentication coverage). Mapped to s 8(1)(a)(i) with status met, with the two ML1 items surfaced as named gaps in the residual risk register.
CIRMP Rules 2023, s 9. Personnel hazards.
Partially metWorkday privileged access review, Q1 2026 (sha256:14fc...b703)
Privileged access review completed for 92 percent of in-scope roles. Eight roles missed the quarterly cycle. Mapped to s 9 with status partially met. Recommendation: complete the eight outstanding reviews before board attestation. Surfaced in the residual risk register.
CIRMP Rules 2023, s 10. Supply chain hazards (s 30CB material suppliers).
Partially metMaterial supplier register, 2026 (sha256:5a7d...02ee)
47 material suppliers identified. 46 have current FOCI declarations on file. One supplier (a regional logistics provider) is missing the declaration. Mapped to s 10 with status partially met. Recommendation: obtain the declaration before the next quarterly review or document the residual risk decision and the compensating control.
Group CISO comments
Cyber and physical accepted. Two Essential Eight items downgraded from ML2 to ML1 with recorded justification. The missing FOCI declaration goes into the residual risk register with a 30-day remediation window. Personnel coverage holds at lightweight depth as agreed in the Phase 1 scope. Ready to sign.
Approver summary
James Walker, Group CISO
Tier 2 data centre operator
Risk classification
Medium
Sovereignty
AWS Sydney, ISM-aligned
Data classification
OFFICIAL: Sensitive
Cycle cadence
Quarterly
Sign and export with a full reasoning trace
Signed export, section 30AC pack
CIRMP Evidence Pack, FY26 Q1
Generated 30 April 2026, 09:21 AEST. Signed with the tenant's per-tenant key. AU-resident trusted timestamp.
Cover page and accountable officer signature
Executive summary and four-hazard coverage view
Cyber and information security panel with ISM and Essential Eight mapping
Personnel hazard panel with HRIS evidence
Supply chain hazard panel with section 30CB declarations
Physical and natural hazard panel with IEC 62443 zones
Residual risk register and prior-period delta
Reasoning trace, control by control, with model id and human override notes
Audit timeline and approval signatures
Offline verification routine and per-tenant signature
Reasoning trace audit timeline
29 Apr 2026, 10:14 AEST
Mei Tran, Compliance Manager
Eight artefacts ingested from Dragos, Claroty, ServiceNow IRM, Sentinel, CrowdStrike, Workday, vendor register and OT site security. Schema validation passed on all eight.
29 Apr 2026, 10:42 AEST
SOCI Sentinel agent
Four-hazard CIRMP draft assembled. 50 control statements mapped. 35 met, 12 partially met, 3 not met. 200-trace reasoning chain recorded.
29 Apr 2026, 14:08 AEST
James Walker, Group CISO
Reviewed cyber and physical hazard panels. Accepted 33 mappings. Overrode 2 with recorded justification (one Essential Eight ML2 claim downgraded to ML1, one supplier flagged for further review).
30 Apr 2026, 09:21 AEST
James Walker, Group CISO
Section 30AC pack signed with the responsible entity's per-tenant key. Board attestation pack assembled. Signed export generated. Verification bundle published.
This is a static walkthrough. The live product ships single-tenant per responsible entity on AWS Sydney, IRAP-aligned at OFFICIAL: Sensitive. Email salam@9t5.com.au or liaqat@9t5.com.au for a working demo against your own artefacts.