Aegis Logo
Aegisby Romhle
Start Here

GRC Foundations

A practical explanation of governance, risk, compliance, and assurance inside Aegis, with a clear view of how dashboards, My Work, and workspaces connect.

Role-based learning tracks

Move through ordered modules tailored to the accountability and judgement of each Aegis role.

Operational lessons

Use step-by-step articles, walkthrough placeholders, and checklists that map directly to live workflows.

Playbooks and reference guides

Connect structured learning with the deeper Knowledge Library when a team needs implementation detail.

GRC Foundations

Use this section to understand how work actually moves through Aegis. Aegis is not a document archive. It is the operating system where governance, risk, compliance, and assurance become visible pressure, owned work, and accountable follow-through.

What GRC means in plain English

In Aegis, governance, risk, compliance, and assurance work as one operating loop. Together they tell people what matters, what is drifting, and what must happen next.

  • Governance sets the rule of the road: who owns the issue, what standard applies, and when review or escalation is due.
  • Risk records the exposure: how serious it is, what controls exist, and whether the current response is still acceptable.
  • Compliance shows whether the organisation is actually meeting the obligation, not just saying that it is.
  • Audit and assurance test whether the visible response is real, timely, and backed by evidence.

How Aegis turns GRC into work

Aegis turns what would otherwise live in decks, trackers, and side conversations into working surfaces. The point is not to store information. The point is to surface pressure, open the right record, and move the next decision.

  • Dashboards show pressure: outside-appetite risk, weak controls, policy debt, high-risk gaps, findings, and overdue remediation.
  • My Work is the queue of reviews, decisions, approvals, remediation steps, and escalations that already need attention.
  • Registers and workspaces are where you inspect the record, confirm ownership, fix traceability, and decide what happens next.
  • Actions, findings, escalations, and work items keep follow-through visible so leadership can see whether the response is moving or stalling.

Why users do what they do in Aegis

Every action in Aegis should answer a practical question: what is rising, who owns it, what happens next, and how will we know the response worked?

  • Review risks early because unmanaged exposure becomes leadership pressure later, when it is harder to contain.
  • Check controls because policy only matters when it changes how work is actually done.
  • Keep policy review current because stale governance content produces weak controls and weaker decisions.
  • Track findings, actions, and remediation because acknowledgement is not the same as closure.

The operating loop inside Aegis

The core rhythm in Aegis is simple: read the signal, open the queue, act in the workspace, review the result, then check whether pressure is actually reducing.

  • Open your dashboard first and find what looks abnormal, late, weak, or repeated.
  • Use My Work to clear the items that already need attention instead of searching the platform blindly.
  • Open the relevant workspace and make the next step explicit: review, approve, remediate, escalate, or close.
  • Return to the dashboard and queue to confirm pressure is reducing rather than moving somewhere else.

Visual foundations

What is GRC in Aegis

Aegis converts governance structure, risk records, compliance gaps, and audit pressure into visible signals, accountable work, and recorded action.

Operating model
domains
signalStep 1

Governance sets policy, cadence, and ownership

signalStep 2

Risk records capture exposure and control linkage

signalStep 3

Compliance and audit reveal gaps, findings, and failures

operating
oversightStep 1

Dashboards surface posture and pressure

queueStep 2

My Work routes accountable follow-up

workspaceStep 3

Registers and workspaces hold the governed record

actionStep 4

Users review, approve, remediate, or escalate

outcomeStep 5

Signals refresh and posture changes become visible

Cross-lane handoffs
policy and oversight signals
risk pressure
gap and assurance pressure
What starts it

A user enters Aegis through dashboards, My Work, or a role manual and needs to understand why the platform exists.

Decision points
  • Is the signal informational, or does it require action in a workspace or queue?
  • Can the issue be resolved locally, or does it require escalation or review?
Results in
  • Review governed records
  • Approve or escalate work
  • Remediate weak controls or findings

Aegis operating model

The current Aegis operating model is backend-first: dashboards aggregate, workspaces compose detail, My Work orchestrates action, and mutations remain inside the owning domain.

Operating model
signals
oversightStep 1

Dashboard aggregators build a role-scoped command surface

signalStep 2

Reference-data endpoints feed scoped lookups and filters

work
workspaceStep 1

Workspace endpoints assemble mixed detail views

actionStep 2

Domain routes handle updates, approvals, and transitions

workflow
queueStep 1

My Work consolidates direct, department, and legacy work

outcomeStep 2

Updated posture flows back into dashboards and queues

Cross-lane handoffs
open the record
safe lookups
generate or complete work
open assigned item
state changes
refreshed signal
What starts it

Aegis pages load role-scoped dashboards, reference data, workspaces, and My Work rather than a single monolithic workflow.

Decision points
  • Should the user go to a workspace now, or act from My Work?
  • Is the user working at enterprise, division, or department scope?
Results in
  • Open a dashboard
  • Open a workspace
  • Act on routed work

Risk management in Aegis

This diagram reflects the actual risk seam: dashboard or register signal, scoped workspace inspection, lifecycle or linkage improvement, and escalation when the record cannot be responsibly advanced in scope.

Exact code path
flow
signalStep 1

Dashboard or register filter highlights a risk needing attention

signalStep 2

Reference data supplies owners, taxonomy, categories, and scope

workspaceStep 3

Risk workspace loads detail, timeline, controls, KRIs, incidents, and traceability

decisionStep 4

Can the record move forward with stronger linkage and review quality?

actionStep 5

Update risk, link controls and KRIs, or progress lifecycle

actionStep 6

Escalate when exposure cannot be resolved locally or remains outside tolerance

outcomeStep 7

Risk posture refreshes in dashboards, queues, and leadership review

What starts it

A user opens the risk dashboard or Risk Register, or creates a new risk through app/api/routes/risk_management.py.

Decision points
  • Is the risk ready to progress its lifecycle state?
  • Can the issue be resolved in scope, or should it be escalated?
Results in
  • Improve traceability
  • Advance lifecycle state
  • Link controls and KRIs

Policy -> Control -> Risk -> Issue/Finding -> Action

This is a code-grounded operating abstraction. The relationships exist across governance, risk, compliance, and audit today, but the traceability path is still partly transitional rather than one perfectly unified runtime engine.

Transitional implementation
flow
signalStep 1

Policy defines expectation, cadence, and ownership

workspaceStep 2

Control implements or evidences the policy

workspaceStep 3

Risk record shows where exposure remains or grows

decisionStep 4

Incident, failed control test, or audit finding reveals breakdown

actionStep 5

Corrective action or remediation is assigned and tracked

outcomeStep 6

Governance posture improves or the gap is escalated

What starts it

A user opens governance policy or control workspaces, or assurance and compliance pressure points surface related gaps.

Decision points
  • Is the weakness local to one record, or does it reveal a broader governance pattern?
  • Does the issue require remediation, escalation, or assurance follow-up?
Results in
  • Strengthen traceability
  • Revisit policy or control ownership
  • Launch remediation or corrective action

Dashboard -> My Work -> Action loop

The current work loop is accurate but transitional: canonical work items exist, while legacy assignments and derived workload still fill gaps where projection coverage is incomplete.

Transitional implementation
loop
oversightStep 1

Dashboard highlights abnormal pressure and action links

queueStep 2

My Work merges effective, legacy, and derived assignments

workspaceStep 3

User opens the underlying workspace or governed record

decisionStep 4

Approve, remediate, escalate, or defer with reason

actionStep 5

Work item becomes completed, overdue, or escalated

outcomeStep 6

Updated status returns to the dashboard signal loop

What starts it

A user sees posture pressure on a dashboard or opens My Work directly.

Decision points
  • Is there already a work item, or is the user acting from a dashboard signal?
  • Is work direct, department-scoped, delegated, or part of an approval chain?
Results in
  • Process queued work
  • Escalate overdue items
  • Complete approvals or remediation