Controls sit outside execution
Policy and QA wrap the workflow instead of governing each step at the moment of action.
Compliance enforced by design — not detected after the fact.
From compliance overlay to execution architecture
Control Orchestration Framework
Most organisations overlay compliance onto operational workflows. COF flips the model: compliance becomes the core execution architecture, and workflow operates inside that governed structure.
Obligations become active states, clocks, gates, arbitration rules, evidence traces and risk signals — so regulated operations can prevent, explain and evidence compliant execution.
Organisations rarely lack policies or controls. Controls sit outside the process — so the operating system can still allow the wrong action.
Policy and QA wrap the workflow instead of governing each step at the moment of action.
Staff and systems infer what is allowed from documents, training and judgement calls.
Multiple obligations apply at once with no single arbitration view before execution.
Dashboards and breach reports surface problems after the fact, not before harm.
Proof is assembled from logs and narratives, not captured at the gate.
Process changes bypass controls until the next audit or incident.
Same business outcome — fundamentally different control geometry.
Traditional compliance controls the process from the outside. COF governs execution from the inside.
Reveal where overlay controls fail — and where COF governs before harm.
Select protections to see how multiple active states collide — and how arbitration picks a dominant path.
Select one or more chips to simulate overlapping protections.
Compare the answer regulators usually hear with the answer COF can evidence.
Traditional answer: policy reference. COF answer: execution trace.
ConventionalHow do we add controls to this process?
COFWhat obligations and states must govern execution before any process step is allowed?
Three integrated layers — from design to execution.
Defines the obligation, state and control model.
Risk · Compliance · PolicyConnects the model to systems, workflow, data, decisioning and reporting.
Technology · EA · EngineeringExecutes, simulates and evidences the control logic.
CRO · COO · Operations · BoardExtended collections narrative:
The proof environment before COF is embedded in PCC, SM, Data Apps or your operational platform.
Load the guided case, run evaluation, try a demand letter — watch blocked outcomes with scoring, arbitration and regulator-ready trace.
Ready for technical depth?
Solution maps, state catalogues, live proof and reports sit in the tabs marked Technical proof. Developer runbooks are in the appendix.
Control Orchestration Framework (COF)
Most organisations can demonstrate compliance. Few can demonstrate structural prevention. COF moves compliance from interpretive process toward engineered determinism: obligations become executable, prohibited actions are blocked at execution time, and breach risk is visible before it materialises.
Embed obligation into execution. Map your risk states and controls to COF. Compliance, stabilised.
This page mirrors the What COF Is story: use the tabs below for the full marketing narrative, then open technical tabs for diagrams and live data.
Same uncomfortable truth
Prohibited activity can still happen in many stacks. Escalation is often calendar-driven, not risk-driven. QA often finds issues after the fact.
for the guided case and the block moment.
Concepts first; expand each block for how it works technically.
Marketing line: Rules become logic your systems can run, not slides people interpret differently.
Business: Regulatory and policy obligations are expressed as configuration (not ad hoc interpretation).
Marketing line: If an action should not happen, it cannot happen, with evidence.
Business: High-risk actions (for example demand, enforcement, referral) are validated against active protections before they run.
Marketing line: See where risk is rising before it becomes a breach headline.
Business: Teams see green / amber / red / black style posture and buffer signals before a breach lands in a report.
A state is a named business condition for a customer, account, or case. Examples often include hardship request / under assessment, hardship active, complaint open, legal or pre-legal hold, vulnerability, on arrangement, with external DCA, and arrears stage (early / late) where you define them. Life-event flags such as bankruptcy or deceased sit on the host model and join the same catalogue when configured.
Each state is defined by parameters. Multi-state is expected. The active set drives which SLA clocks, prohibited activities, and mandatory obligations apply, after arbitration.
Typical collections and hardship environments rely on policy, training, and after-the-fact checks. COF is built so evidence shifts from policy reference to execution trace, and from monitoring to structural prevention.
Policy on file, training, suppression in some paths, QA after the fact. Enforcement can still be technically possible. Prevention depends on memory and discipline.
Hardship activates in the model. A real-time gate blocks enforcement-class actions. Blocked attempts log with trace IDs. New reality: while protected, enforcement is structurally blocked, not merely discouraged.
Timer in the system, escalation at a fixed day (for example day 15), calendar-driven queues. Breaches surface late; escalation is time-based, not risk-weighted.
Obligation clocks with pause and resume, buffer zones before breach, exposure-weighted risk. Escalation when risk rises (exposure, vulnerability, backlog), not only when a date ticks over.
Suppression flags and manual checks. Overrides possible; state collisions handled inconsistently.
Central matrix plus activity gate, dominance when states collide, structured override with QA hooks. Deterministic control, not partial automation only.
Periodic testing, sample QA, spreadsheet attestations. Coverage of automated vs manual often unknown.
Coverage registry, automation ratio, recertification cadence, decision trace replay, policy vs config drift views. Integrity is monitored continuously.
“We have automation in some workflows” without a definitive coverage number. Manual dependency stays high.
Maturity is expressible as % mapped to executable controls and % deterministic. COF targets high automation at maturity Level 4, toward Level 5 with simulation.
Policy update, change request, manual testing, hope for no side effects. Impact often unknown until after deployment.
Versioned parameters, where-used, impact simulation, projected breach exposure, stability delta. Know the impact before you deploy the change.
COF evolves compliance into something that is:
It moves compliance from a control function to an operational architecture. From monitoring breaches to engineering stability. Most organisations can demonstrate compliance. Few can demonstrate structural prevention. COF makes compliance executable. That changes the conversation entirely.
To execution trace and deterministic runs.
To engineered controls in registers and engines.
To deterministic prevention and foresight.
From interpretive to deterministic. From static day-15 style thresholds to predictive scoring. From fragmented rules to orchestrated state, gate, and trace. From reactive reporting to trusted explainability. From change risk to change simulation.
| Typical environment | With COF |
|---|---|
| Rules scattered across documents and workflows | Executable obligations in registers and engines |
| Inconsistent handling when states overlap | Deterministic arbitration and governing obligation |
| Hard-coded SLA day thresholds | Versioned clock governance and buffer banding |
| After-the-fact breach discovery | Proactive breach posture and decision trace |
| Most environments have rules | Few have executable obligations, deterministic arbitration, versioned clock governance, exposure-weighted breach modelling, stress-tested regulatory simulation together |
Maturity: designed for Level 4 deterministic execution, moving toward Level 5 predictive and simulation-led assurance. Detail in the COF Three Layers material.
One line for executives and architecture reviews:
We have developed a Control Governance Framework (CGF), implemented through a Regulatory Execution Architecture (REA), delivered via a configurable Control Orchestration Platform (COP).
| Layer | Business question | Role |
|---|---|---|
| CGF | What should exist? | Design authority: obligation taxonomy, state model, arbitration philosophy. |
| REA | How does it work technically? | Blueprint: data shapes, engines, integration to PCC or other hosts. |
| COP | Does it run? | Platform: state evaluation, gate, scoring, reporting, simulation in full rollout. |
flowchart LR
subgraph b [Business view]
P[Policy and obligations] --> C[COF]
C --> O[Prevention and trace]
end
subgraph t [Technical view]
SD[State catalogue] --> SE[State engine]
SE --> ST[Active states]
PM[Prohibition matrix] --> GA[Gate decision]
ST --> GA
end
COF guardrails your decision engine. It does not replace it. It does not allocate work, assign delegated authority, or redesign host workflows. It emits structured signals (scores, blocks, traces) that plug into PCC, Pega, or your operational stack.
Strategic elevation: collections moves from operational compliance alone to engineered compliance: executable obligations, deterministic arbitration, versioned clock governance, exposure-weighted breach modelling, stress-tested regulatory simulation.
Open the technical tabs to go deeper: Solution map for diagrams, State & gate logic for live catalogue and matrix samples, Live proof for evaluation, Demo reports for sample dashboards.
From interpretive policy to engineered execution: Framework (CGF), Architecture (REA), Platform (COP).
flowchart LR
subgraph design [Design]
CGF["COF Framework (CGF)"]
end
subgraph blueprint [Blueprint]
REA["COF Architecture (REA)"]
end
subgraph run [Execution]
COP["COF Platform (COP)"]
end
CGF --> REA
REA --> COP
Host["Host SoR / PCC"] -->|entity snapshot| COP
COP --> Out["slarisk · gate · trace"]
flowchart TB
E[Entity snapshot from host] --> SE[State engine]
SD[State catalogue config] --> SE
SE --> AS[Active states multi-state]
AS --> PM[Prohibition matrix]
PM --> G{Gate allow / block}
CLK[SLA clocks & breach bands] --> SL[Proactive score / risk band]
AS --> SL
What you are seeing: Each row is one state definition in the configured catalogue. Business-facing names map to internal codes (state_id). Entry and exit columns are the parameterised rules: when host-supplied fields satisfy them, the engine treats that state as active or inactive. That same active set drives which clocks, prohibited actions, and mandatory obligations apply (via separate matrix and register configuration). Multiple states can be active at once; arbitration orders them for gate and reporting.
Sample rows below are live from this demo’s configuration (same idea as production: catalogue + parameters, not code changes per rule). Toggle inactive rows to compare superseded definitions. For a narrative explanation, see the Business tab, section “States: what they are and how they drive the rest.”
| state_id | state_name | Account | Case | Customer | Status | entry_condition | exit_condition |
|---|
What you are seeing: Each row ties one or more active state codes to a prohibited activity (for example send demand, outbound dialler, enforcement). The gate uses this with the resolved active state set. Use Live proof after you compute states to run an illustrative allow or block check.
| prohibition_id | if_states_active | prohibited_action | reason_code |
|---|
Three proofs in one flow
This panel is the demo. Load the guided case, run evaluation, then attempt a high-risk action. You should feel the block before you read the footnotes. Obligation scoring shows why this case can go red before a calendar escalation day. The trace block is what you would show a regulator.
Pick a guided case and click Run evaluation.
We do not stop activity. We redirect it to next best compliant actions. Multiple clocks can run in parallel; risk is not a single calendar day.
Run evaluation to see the obligation stack.
Move the slider to change the hardship decision SLA length (days). The demo recalculates days remaining and risk band for the guided case without pretending to be a full production model.
Same activities your host would send to a gate. The demo shows BLOCKED or ALLOWED, governing obligation, and next best compliant actions.
Several protections can apply at once. COF resolves which concern governs each class of decision.
Run evaluation to see governance lines.
What you would put in front of an audit: outcome, rationale, protections, parameters.
Trigger an action after evaluation to populate trace.
HTML dashboards with a Data source toggle: static sample_slarisk.csv or live Postgres treatment scores.
For live config use admin;
for live evaluation use Live proof.
Local run instructions, database configuration, and developer orientation for this demo environment.
This demo uses the real Python state engine. Reference data (ref_cof_*) loads from PostgreSQL when DATABASE_URL is set (Railway); otherwise from repo CSVs. Open a terminal in the COF folder (parent of demo/) and run:
cd path\to\COF py demo\serve.py
Open http://127.0.0.1:8765/demo/index.html (or http://127.0.0.1:8765/). Use 127.0.0.1, not localhost, if the page does not load (IPv6 vs IPv4).
Or run run-demo.ps1 from the COF folder. Optional: py demo\serve.py --port 8766 if the port is busy.
reporting/.