Canonical Institutional Route 1 4-Page Brief 2 Review Index 3 Evidence Request 4 Protected Diligence
Procurement-safe request template

Minimum Evidence Required for Institutional Reliance

A procurement-safe evidence request for ministries, sovereign programmes, MDBs/DFIs, procurement, vendor risk, IT/security and auditors before approving Terra Vita Hub for programme deployment, portfolio inclusion or institutional reliance.

Subject and purpose

Subject: Minimum Evidence Required for Institutional Reliance on Terra Vita Hub.

Purpose: To request the protected, diligence-complete artefacts required before approving Terra Vita Hub for programme deployment, portfolio inclusion, or institutional reliance.

How to use this template

Copy this request into your standard vendor-risk, IT-security, procurement or RFP questionnaire, or attach it as an annex to contract review.

Formal approval should not proceed until the evidence below has been reviewed and validated by the responsible procurement, IT/security, fiduciary and programme oversight teams.

1. Governance & Reviewer Controls

2. Security, Reliability & Operational Assurance

3. Data Lifecycle & Residency

4. Integration & Interoperability Controls

5. Programme-Specific Configuration

6. Contractual Commitments

7. Additional Evidence, if applicable

Institutional position

This request reflects the minimum evidence required for institutional reliance. Public governance narrative is not a substitute for protected, verifiable, deployment-specific artefacts. Formal approval should not proceed until the evidence above has been reviewed and validated by procurement, IT/security, fiduciary teams and programme oversight.

Current attestation posture

What is public, what is status-based, and what remains protected.

Evidence domainCurrent public postureProtected diligence treatment
SOC 2Not represented as completed in public materials.Status, roadmap, control mapping, or third-party evidence can be provided under NDA when applicable.
ISO 27001Alignment pages describe control intent; certification is not claimed unless separately evidenced.Policies, control matrices, or certification artefacts are purpose-bound.
Pen-testingPublic pages identify the evidence category without publishing sensitive findings.Frequency, scope, remediation posture, and summaries are provided only to authorised reviewers.
Deployment isolationSingle-tenant or logically separated deployment models are reviewed as configuration choices.Architecture, hosting, residency, logging, and access proof are validated per deployment.

Reliance boundary: deployment-specific evidence, test reports, security artefacts, data residency proof, audit samples, reviewer records, and live programme proof are provided through protected diligence or under NDA, not on the public homepage.