Vanta Connector: Pull Live Compliance Data into Rakenne Skills
How to connect your Vanta account to Rakenne so compliance skills can query controls, test results, evidence, vulnerabilities, and personnel data directly — without manual uploads.
If your organization uses Vanta to manage compliance, your controls, test results, evidence, and personnel data are already there. Rakenne’s Vanta connector lets the AI agent pull that data directly into compliance skills — replacing manual document uploads with live API queries.
This guide explains what the connector does, how to set it up, and what data your skills can access.
What the Vanta connector does
The Vanta connector is an opt-in integration that gives Rakenne’s compliance skills read-only access to your Vanta account. When a skill like ISO 27001 Gap Assessment runs, the agent can query your actual controls, test results, and evidence instead of relying on manually uploaded spreadsheets.
| Without the connector | With the connector |
|---|---|
| Export CSVs from Vanta, upload to Rakenne | Agent queries Vanta directly during the skill run |
| Data is stale the moment you export it | Data is fresh — pulled on demand |
| Manual effort to gather evidence | Agent discovers controls, tests, and evidence automatically |
| Gap assessment based on uploaded documents only | Gap assessment cross-references Vanta controls against ISO requirements |
The connector is fully opt-in: it only activates when a skill explicitly requires it. If you’re using skills that don’t need Vanta data (contract drafting, clinical reports, etc.), the connector is invisible — no extra tools in the agent’s prompt, no settings to configure, no overhead.
Two tiers: Management and Auditor
The connector supports two Vanta API tiers, matching Vanta’s own access model:
Management API (for companies)
Use this when your organization has its own Vanta account and you want to assess your own compliance posture.
- Who uses it: In-house GRC teams, compliance managers, CISOs
- What it accesses: Your organization’s controls, test results, evidence documents, vulnerabilities, personnel compliance, and vendor data
- Authentication: OAuth 2.0 with client credentials
- Rate limit: 50 requests/minute
Auditor API (for audit firms)
Use this when you’re an external auditor who needs to access client organizations through Vanta’s Auditor Portal.
- Who uses it: Lead auditors, certification bodies, GRC consultants conducting client audits
- What it accesses: Everything the Management API provides, plus audit listings and cross-organization evidence retrieval
- Authentication: OAuth 2.0 with client credentials (requires Vanta Audit Partner registration)
- Rate limit: 250 requests/minute (read), 600 requests/minute (evidence listing)
You can configure both tiers independently. An audit firm might use the Auditor API for client engagements while also using the Management API for their own internal compliance.
Setting up the connection
Prerequisites
- A Vanta account with API access enabled
- A Vanta API application (created in your Vanta dashboard under Settings > API)
- The Client ID and Client Secret from that application
For Auditor API access, your firm must be registered as a Vanta Audit Partner. Contact your Vanta representative if this isn’t set up yet.
Step 1: Open Integrations settings
In Rakenne, go to Settings > Integrations. You’ll see two cards:
- Vanta (Management API) — for your own organization’s data
- Vanta (Auditor API) — for cross-organization audit access
Step 2: Enter credentials
Click Connect on the tier you want to configure. Enter the Client ID and Client Secret from your Vanta API application, then click Save.
Rakenne encrypts these credentials at rest using AES-256-GCM. The raw credentials are never exposed to the AI agent — all API calls go through an internal proxy that handles authentication transparently.
Step 3: Verify the connection
After saving, the card shows your masked Client ID (e.g., vci...3456) and a Connected status. If the credentials are invalid, you’ll see an error message explaining what went wrong.
Disconnecting
Click Disconnect at any time to remove stored credentials. Active sessions will be restarted to reflect the change.
What data is available
Once connected, skills that depend on the Vanta connector get access to six data tools (Management API) or eight tools (Auditor API):
Controls
Tool: vanta_list_controls
Lists your compliance controls with their current status, framework associations, and assigned owners. This is the foundation for gap assessments — the agent can compare your Vanta controls against framework requirements to identify gaps.
Example use: An ISO 27001 gap assessment skill queries all controls, maps them to Annex A requirements, and identifies which controls are missing, incomplete, or failing.
Test results
Tool: vanta_list_tests
Retrieves automated test results — the checks Vanta runs against your connected integrations (AWS, GCP, Okta, etc.). Can filter for failing tests only, so the agent focuses on what needs attention.
Example use: The agent pulls failing tests, cross-references them with the controls they validate, and generates a remediation priority list.
Evidence documents
Tool: vanta_list_documents
Lists evidence documents linked to controls. Documents in Vanta are file-based evidence (policies, procedures, screenshots) that auditors review.
Example use: During a gap assessment, the agent checks which controls have supporting evidence uploaded and which are missing documentation.
Vulnerabilities
Tool: vanta_list_vulnerabilities
Retrieves open vulnerabilities — package dependencies, static analysis findings, and API endpoint issues — with their severity and remediation status.
Example use: A security posture review skill pulls open vulnerabilities, groups them by severity, and drafts remediation recommendations aligned with your risk appetite.
Personnel compliance
Tool: vanta_list_personnel
Shows employee compliance status: security training completion, MFA enrollment, and device compliance.
Example use: The agent identifies employees who haven’t completed security awareness training or lack MFA, and flags this as a finding in the gap assessment.
Vendor risk
Tool: vanta_list_vendors
Lists third-party vendors with their risk assessment status and security review information.
Example use: A supplier security assessment skill pulls your vendor list and checks whether high-risk vendors have completed security questionnaires.
Audits (Auditor API only)
Tool: vanta_list_audits
Lists all audits accessible to the auditor account, showing client organization, framework, status, and dates.
Example use: An auditor opens a new Rakenne project for a client engagement and queries their active audits to understand the scope.
Audit evidence (Auditor API only)
Tool: vanta_auditor_list_evidence
Retrieves evidence items for a specific audit, with control mappings and completion status. This is the cross-organization evidence access that distinguishes the Auditor tier.
Example use: The agent pulls all evidence for an ISO 27001 audit, checks completeness per control, and generates an evidence sufficiency report.
How skills use the connector
Skills opt into the Vanta connector by declaring it as a dependency in their metadata.json:
{
"title": "ISO 27001 Gap Assessment",
"dependencies": ["vanta-connector"]
}
Or for auditor-tier access:
{
"title": "ISO 27001 Audit Evidence Review",
"dependencies": ["vanta-auditor-connector"]
}
When you install a skill with a Vanta dependency, the connector tools become available to the agent in that project. When you uninstall the skill, the tools are removed.
A skill that depends on vanta-auditor-connector gets all eight tools (the six base tools plus audits and audit evidence). It does not need to also list vanta-connector — the auditor variant is self-contained.
Pagination
All Vanta tools support pagination through two parameters:
- pageSize: Number of results per page (1–100, default 25)
- pageCursor: Cursor for the next page (omit for the first page)
Each tool response includes pagination information — whether there’s a next page and what cursor to use. The agent handles pagination automatically when iterating through large datasets.
Security model
The Vanta connector follows the same security patterns as other Rakenne integrations:
- Credentials encrypted at rest using AES-256-GCM, stored in the same encrypted credential store as LLM API keys
- Proxy architecture: The AI agent process never sees raw Vanta credentials. All API calls go through the Rakenne backend, which adds authentication headers transparently
- Read-only access: The connector only supports GET requests in this phase. No data is written back to Vanta
- Admin-only configuration: Only tenant owners and admins can configure or use the Vanta connection
- Path validation: The proxy rejects any request attempting path traversal outside Vanta’s
/v1/API namespace - Per-tenant isolation: Each tenant’s Vanta credentials are separate. One tenant cannot access another’s Vanta data
Practical workflow: ISO 27001 Gap Assessment with Vanta
Here’s what a typical session looks like when running the ISO 27001 gap assessment skill with the Vanta connector:
You: “Run the gap assessment against our Vanta data”
Agent: Calls
vanta_list_controlsto pull all controls with their status and framework mappingsAgent: Calls
vanta_list_testswithfailingOnly: trueto identify which automated checks are failingAgent: Calls
vanta_list_documentsto check evidence coverage per controlAgent: Calls
vanta_list_personnelto assess people-related compliance (training, MFA)Agent: Runs
mandatory_artifact_detector,clause_requirements_engine, and other skill tools — now informed by real Vanta data instead of manually uploaded documentsAgent: Produces a gap assessment report that references your actual control status, failing tests, and missing evidence — not hypothetical gaps
The result is a gap assessment grounded in your live compliance posture, not a static snapshot from last week’s CSV export.
Important notes
Vanta single-token limitation: Vanta allows only one active access token per API application. If you use the same Vanta application elsewhere, creating a new token in Rakenne will invalidate the previous one. We recommend creating a dedicated Vanta API application for Rakenne.
Rate limits: The Management API allows 50 requests per minute. For large organizations with hundreds of controls, the agent paces its requests automatically. The Auditor API has a more generous 250 requests per minute.
Data freshness: The connector pulls data on demand during each skill run — there’s no background sync or caching between sessions. Each run gets the current state from Vanta.
Future plans: Write-back support (uploading policies drafted in Rakenne as Vanta evidence documents) is planned for a future release.