Back to Home
Developer Hub

Deadlina Platform
Documentation

Welcome to the Deadlina developer and compliance hub. This documentation provides everything you need to implement, automate, and monitor your compliance frameworks programmatically.

Quick Start Guide

Get up and running with your first audit in 5 minutes.

API Reference

Explore our REST API endpoints and SDKs.

Authentication

The Deadlina API uses API keys to authenticate requests. You can view and manage your API keys in the Dashboard Settings.

Authorization: Bearer dl_live_7a8b9c0d1e2f3a4b5c6d

Framework Implementation

SOC 2 Type I & II

Automated evidence collection for Security, Availability, Processing Integrity, Confidentiality, and Privacy trust services criteria.

View Implementation Guide

ISO 27001 & 27701

Implementation guidelines for Information Security Management Systems (ISMS) and Privacy Information Management Systems (PIMS).

View Implementation Guide

HIPAA Security Rule

Mapping technical safeguards to specific API endpoints for PHI access auditing and encryption verification.

View Implementation Guide

PCI DSS v4.0

Continuous monitoring of Cardholder Data Environments (CDE) and automated segmentation checks.

View Implementation Guide

API Reference

Endpoint: List Obligations
GET /v1/obligations
curl https://api.deadlina.com/v1/obligations \
  -H "Authorization: Bearer $API_KEY"