AUDITOR-CUSTOMER COLLABORATION

Designing for post-audit retention

EXPERTISE

Product Design · Systems Design

impact

Improve retention for Year-2+ customers

When success became the churn risk

When success became the churn risk

When success became the churn risk

Secureframe's churn risk had shifted. Customers weren't leaving because they failed to get compliant—they were leaving after they succeeded.

Internal analysis revealed that ~40% of churn occurred after an audit report was issued. The pattern: once audit work moved into auditor portals, spreadsheets, and email, Secureframe became less central to day-to-day workflows. Customers started questioning whether they still needed the platform.

Source: Internal churn analysis, Q2–Q4 2025

THE GOAL: keep audit collaboration inside Secureframe so customers stay engaged through—and after—their audits.

Background

Secureframe is a compliance platform that helps companies prepare for audits by centralizing controls, evidence, and audit context.In practice, much of the audit work moved outside the platform into auditor portals, spreadsheets, or email—fragmenting the experience.

In practice, much of the audit workflow moved outside the platform during active audits, fragmenting the experience and reducing trust in what was truly audit-ready.

Timeline

Multi-phase rollout, shipped incrementally during live audits

The Team

1 PM, 1 Designer (me), 1 Engineer, Compliance stakeholders

My Role

Led design for the Audit Portal. My PM defined scope and business framing; I owned design decisions—interaction model, information architecture, and UX flows.

The inherited state

The inherited state

The inherited state

An earlier version of the Audit Portal existed, but it was built for internal visibility—helping Secureframe track which customers were in audit. It wasn't solving the retention problem because there was no way for auditors and customers to actually collaborate inside the platform.

V1: Basic audit tracking

Reframing the approach

Reframing the approach

Reframing the approach

When my PM and I picked up the project, we shifted the focus from "track audits" to "keep audit collaboration inside Secureframe."

The question became: what would make auditors actually want to work here instead of their own portals?

Give auditors clarity

A scoped view of what they need: test, evidence, context

Enable back-and-forth

Without forcing customers into external tools

Ship incrementally

Simple enough to release during live audits

These principles shaped the key design decisions that followed.

Key design decisions #1 — Restructuring audit creation

Key design decisions #1 — Restructuring audit creation

Let's Start Testing

The original "Add an audit" flow put all fields in a single form—framework, dates, audit firm. But these are distinct concepts that needed to be sequenced, not flattened.

❗️BEFORE: All fields in one flat form

✅ AFTER: Guided 3-step flow separating framework, evidence scope, and auditor access

Separating these concepts reduced cognitive load and prevented configuration errors—especially important since audits can't be easily restarted once evidence is scoped wrong.

Key design decision #2 — The "responses" model

Key design decision #2 — The "responses" model

Let's Start Testing

The previous system showed test health statuses (passing/failing). But auditors don't care about health—they care about whether evidence is ready for review.

I introduced a "Response" model: tests are marked as Submitted, Action Required, or Accepted. This reframed the UI around audit workflow, not compliance state.

Admin experience

  1. Response counts replace health status as the primary progress indicator

  2. Tests show audit readiness (Submitted, Action required, Accepted)

  3. Dropdown lets users update response status directly

Key design decision #3 — Collaboration without leaving the platform

Key design decision #3 — Collaboration without leaving the platform

Let's Start Testing

To keep communication inside the platform, each test has two comment threads: Auditor comments (shared with the auditor) and Internal comments (visible only to the customer's team).

This lets customers coordinate internally before responding—without switching to Slack or email. Auditors see a single "Comments" tab; they don't need to know an internal thread exists.

Auditors see a single "Comments" tab—they don't need to know an internal thread exists.

Admins see both Auditor comments (shared) and Internal comments (private). Auditors only see the shared thread.

Key design decisions #4 — Two users, one audit

Key design decisions #4 — Two users, one audit

Key design decisions #4 — Two users, one audit

The Audit Portal serves two users: company admins running the audit, and external auditors reviewing evidence. They collaborate on the same audit object, but with different permissions and information needs.

Admins can manage the audit, see internal health statuses, and mark tests as ready for review.

Auditors see a scoped-down view focused only on what they need to evaluate—and can mark tests as Accepted or Action Required.

Admin experience

  1. Can edit and delete audits

  2. Health status visible

  3. Marks tests as "Submitted" or "Not ready"

Auditor experience

  1. No edit controls

  2. Health status hidden

  3. Marks tests as "Accepted" or "Action Required"

The shipped product

The shipped product

The shipped product

Early signals / Feedback

Early signals / Ffeedback

Early signals / feedback

The Audit Portal shipped incrementally and is now in early access. Full retention data isn't available yet, but early feedback has been positive.

  • Rolled out to 68 customers in early access.

  • 25+ audits actively in progress across 10 audit firm partners.

  • The module supports SOC 2, ISO 27001, HIPAA, and PCI audits.

Internal Slack message sharing customer feedback during early rollout.

Customer adoption has been strong—that was the first goal. The next opportunity is auditor adoption.

We intentionally built for customers first, giving them control and visibility during audits. But to fully close the loop, auditors need more reasons to work inside Secureframe instead of their own tools—things like a dedicated auditor view, audit completion workflows, and asset exports.

Reflection

Reflection

This project reinforced something I keep coming back to: success can create its own failure mode. Customers weren't struggling, they had already passed. The challenge wasn't helping them get compliant; it was making Secureframe valuable after they succeeded.