Regulation Mapping.

Each framework below carries specific obligations that AI workflows inherit the moment they touch regulated data or regulated decisions. The tables show the requirement, the mechanism in the platform that addresses it, and the evidence that mechanism produces for an external auditor.

HIPAA Security Rule

Covered entities and business associates processing PHI through AI assistants inherit the same Security Rule obligations that apply to any other access path to ePHI.

ClauseRequirementMechanismEvidence
45 CFR 164.312(a)(1)Access control over ePHIIdentity-aware policy evaluation with per-role action overrides on the AI gateway.Identity-tagged decision records for every AI request, retained in the forensic store.
45 CFR 164.312(b)Audit controlsTamper-evident forensic record on every gateway decision, signed and append-only.Per-event audit trail exportable by control narrative.
45 CFR 164.312(c)(1)Integrity of ePHIInline PHI detection with deterministic redact, tokenize, or block actions.Original request, transformed request, and policy version preserved per transaction.
45 CFR 164.308(a)(1)(ii)(D)Information system activity reviewRead-only forensic projection queryable by compliance team or external auditor.Auditor-issued queries leave their own trace; signed result sets are retained.

SOC 2 Trust Services Criteria

Common Criteria points where DeepInspect produces evidence that auditors typically request during a Type II engagement.

ClauseRequirementMechanismEvidence
CC6.1Logical access controlsIdentity-tagged policy evaluation with role-based action maps on every AI request.Access-decision logs aligned to user identity and policy version.
CC6.6Monitoring for unauthorized accessEvent-level audit trail of allow, redact, tokenize, and block decisions.Continuous log of attempted and enforced control points.
CC7.2Monitoring system components for anomaliesReal-time block and escalation paths on policy violation, exported to SIEM.Incident-grade records for unauthorized prompts, payloads, and identities.
CC8.1Change managementPolicy versioning, staged replay against production traffic, explicit promotion.Version history, replay diff, and approver record per profile.

Need a written record of where your AI workloads stand against these frameworks?

The two-week compliance audit produces it.

EU AI Act

Obligations for providers and deployers of high-risk AI systems. DeepInspect supplies the enforcement and record-keeping layer the regulation anticipates.

ClauseRequirementMechanismEvidence
Article 9Risk management systemInline policy enforcement at request time with fail-closed defaults.Configuration history of risk controls and per-request enforcement decisions.
Article 12Record-keepingForensic store retaining decision, policy version, identity, and full transaction.Tamper-evident logs available for the full retention window.
Article 13Transparency and information to deployersIdentity-based restrictions and per-role action overrides applied to actor classes.Mapping of which actor classes are subject to which rules, versioned over time.
Article 17Quality management systemPolicy versioning workflow with staged replay and explicit promotion gates.Change-control trail per policy profile with reviewer attribution.

GLBA / SEC Regulation S-P / FINRA Rule 4511

Financial services obligations around customer data protection, books-and-records retention, and supervision of representative communications.

ClauseRequirementMechanismEvidence
GLBA Safeguards RuleAdministrative, technical, and physical safeguards for NPIPII and customer-data detectors with role-based redact, tokenize, or block actions.Per-transaction record of NPI handling and policy version applied.
SEC Regulation S-PProtection of customer records and informationIdentity-aware segmentation enforced inline at the gateway.Identity-tagged access trail across every AI interaction touching customer data.
FINRA Rule 4511Books and records retentionObject-store retention of complete AI request and response payloads.Customer-configured retention window with cryptographic integrity guarantees.

NIST AI RMF and ISO 42001

Voluntary frameworks that auditors and customers increasingly cite as the baseline for an AI management system. DeepInspect maps to the technical-control portions of both.

ClauseRequirementMechanismEvidence
NIST AI RMF — GovernPolicy, accountability, and oversight structuresPolicy profiles bound to application routes, versioned in the control plane.Profile inventory, version history, and ownership metadata.
NIST AI RMF — MeasureContinuous measurement of AI system behaviorForensic record of every gateway decision, queryable in the read-only projection.Time-series and per-event reporting on policy outcomes and exceptions.
NIST AI RMF — ManageRisk response and continuous improvementStaged replay of draft policies against production traffic before promotion.Replay diffs and approver decisions retained per profile change.
ISO 42001 — Clause 8 (Operation)Operational controls for AI systemsInline enforcement with deterministic and natural-language policy classes.Decision record per request, with policy version and action taken.

How the gateway produces this evidence

Every AI request passes through the policy gateway before reaching an upstream model. Identity is resolved at the edge. Deterministic detectors and natural-language policies evaluate the request, and the configured action (allow, redact, tokenize, block) is applied with per-role overrides. The full transaction is retained in a customer-configured object store; the decision is retained in a tamper-evident forensic projection.

For an auditor, this means a single query against the forensic projection returns every policy decision against a given user, payload class, or time range. For an enterprise, this means the same configuration that enforces policy is also the configuration that produces the audit record. The two are not separate systems.

One enforcement layer. Multiple framework obligations addressed.

Book a compliance audit