Audit-ready evidence on demand
Every Security Target, Certification Report, and Maintenance Report archived with its source URL, fetch timestamp, and content hash. When the auditor asks why you trust the certificate, the evidence file is one click away - not a vendor email chain from six months ago.