Nopal/noh-pahl/
Where knowledge compounds
Certifications

Gap Analysis

All unsatisfied requirements across your active certifications, with Nopal suggestions to help close gaps.

Total Gaps

36

With Suggestions

4

Cross-Cert Overlaps

1

Cross-Certification Overlaps

These entries satisfy requirements across multiple certifications — maximizing your evidence reuse.

Migrate to self-hosted LLMs

This decision satisfies requirements across 2 certifications:

B CorpCarbon footprint measurement
SOC 2Access control policy

Unsatisfied Requirements (36)

Employee satisfaction surveyB CorpWorkers

Conduct annual employee satisfaction surveys with published results.

Q2 Pricing Sensitivity Survey Results31%
Waste reduction programB CorpEnvironment

Documented waste reduction and recycling program.

Proactive CS outreach reduces churn by 30%30%
Consent managementSOC 2Privacy

Mechanism for collecting and managing user consent.

Competitive Pricing Analysis25%
Privacy impact assessmentsSOC 2Privacy

PIAs conducted for new products, features, or data processing activities.

Migrate to self-hosted LLMs25%
Board-level ESG oversightB CorpGovernance

Evidence that the board reviews ESG performance at least quarterly.

Stakeholder governance policyB CorpGovernance

Written policy considering impact on all stakeholders, not just shareholders.

Executive compensation ratio disclosureB CorpGovernance

Public disclosure of CEO-to-median-worker pay ratio.

Anti-corruption policyB CorpGovernance

Formal anti-corruption and anti-bribery policy in place.

Living wage verificationB CorpWorkers

Verify all employees earn at least a living wage for their region.

Professional development programB CorpWorkers

Structured training and development opportunities for all employees.

Worker safety policyB CorpWorkers

Documented workplace safety standards and incident reporting.

Diversity and inclusion metricsB CorpWorkers

Track and report workforce diversity data annually.

Local supplier preference policyB CorpCommunity

Documented preference for local and diverse suppliers.

Community engagement programB CorpCommunity

Structured volunteer or community service program for employees.

Charitable giving commitmentB CorpCommunity

Donate at least 1% of revenue or profits to charitable causes.

Supplier code of conductB CorpCommunity

Written code of conduct required for all major suppliers.

Community impact assessmentB CorpCommunity

Annual assessment of company's impact on local community.

Renewable energy commitmentB CorpEnvironment

Plan or commitment to transition to renewable energy sources.

Environmental management systemB CorpEnvironment

Formal environmental management system (e.g., ISO 14001 aligned).

Water usage monitoringB CorpEnvironment

Track and report water consumption with reduction targets.

Sustainable procurement policyB CorpEnvironment

Policy prioritizing environmentally sustainable products and services.

Multi-factor authenticationSOC 2Security

MFA required for all employee accounts and admin access.

Encryption at rest and in transitSOC 2Security

All sensitive data encrypted using AES-256 at rest and TLS 1.2+ in transit.

Vulnerability management programSOC 2Security

Regular vulnerability scanning and patching within defined SLAs.

Incident response planSOC 2Security

Documented incident response plan with defined roles and escalation.

Penetration testingSOC 2Security

Annual penetration testing by qualified third party.

Uptime SLA definedSOC 2Availability

Published SLA with defined uptime targets (e.g., 99.9%).

Disaster recovery planSOC 2Availability

Documented DR plan with RTO and RPO targets.

Backup verificationSOC 2Availability

Regular backup testing and restoration verification.

Capacity planningSOC 2Availability

Documented capacity planning process with monitoring.

Data classification policySOC 2Confidentiality

Formal data classification scheme (public, internal, confidential, restricted).

Data retention and disposalSOC 2Confidentiality

Policy defining retention periods and secure disposal methods.

NDA/confidentiality agreementsSOC 2Confidentiality

All employees and contractors sign confidentiality agreements.

Data loss preventionSOC 2Confidentiality

DLP controls to prevent unauthorized data exfiltration.

Privacy policy publishedSOC 2Privacy

Up-to-date privacy policy accessible to all users.

Data subject rights processSOC 2Privacy

Process for handling access, correction, and deletion requests.