Skip to main content

Enterprise Compliance Framework

Provides compliance frameworks and practical mapping guides that must be followed when operating AI platforms in enterprise environments.

Why AI Compliance Is Needed

Traditional IT Compliance vs AI Operations Compliance

Key Difference

Traditional IT compliance deals with static systems, while AI compliance deals with non-deterministic, learning systems.

AreaTraditional IT ComplianceAI Operations Compliance
PredictabilityCode → Same input = Same outputModel → Same input may produce varying outputs
Access ControlDB/API levelModel API + Prompt + Output filtering
Audit TrailTransaction logsInference traces + Token usage
Change ManagementCode deploymentModel version + LoRA adapter + Playbook
Incident ResponseRollback + HotfixModel swap + Guardrails hardening

AI-Specific Risks

AI-Specific Compliance Risks
  • Hallucination: Model generates factually incorrect information
  • Prompt Injection: Malicious input manipulates model behavior
  • PII Exposure: Personal information leaked from training data
  • Model Bias: Discriminatory outputs against specific groups
  • Token Abuse: Cost explosion and resource exhaustion

These risks must be mapped to existing compliance frameworks to establish actionable controls.


SOC2 Trust Criteria ↔ AI Operations Mapping

SOC2 (Service Organization Control 2) is a global standard for verifying cloud service security, availability, and confidentiality.

SOC2 Control Mapping Table

SOC2 ControlTrust CriteriaAI Operations ImplementationTechnology Stack
CC6.1-6.8Logical/Physical access controlModel API auth + Data access controlPod Identity + RBAC + API Key
CC7.1-7.4System monitoringInference request tracking + GPU resource monitoringLLM Tracing + AMP/AMG + DCGM
CC7.3Anomaly detection and incident responseAutomatic alerts + Playbook rollbackPagerDuty + ArgoCD
CC8.1Change managementPlaybook version control + Approval gatesGitOps + Approval Gate

CC6: Access Control Implementation Example

# EKS Pod Identity + RBAC-based model API access control
apiVersion: v1
kind: ServiceAccount
metadata:
name: model-api-sa
annotations:
eks.amazonaws.com/role-arn: arn:aws:iam::123456789012:role/ModelAPIAccessRole
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: model-reader
rules:
- apiGroups: ["serving.kserve.io"]
resources: ["inferenceservices"]
verbs: ["get", "list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: model-reader-binding
subjects:
- kind: ServiceAccount
name: model-api-sa
roleRef:
kind: Role
name: model-reader
apiGroup: rbac.authorization.k8s.io
CC7.1-7.4 Implementation: LLM Tracing

Record all inference requests as auditable traces. For implementation methods, see Agent Monitoring and LLM Tracing Deployment.


ISO27001 Annex A ↔ AI Operations Mapping

ISO27001 is the international standard for Information Security Management Systems (ISMS). Annex A defines 114 control items.

ISO27001 Control Mapping Table

Annex AControl AreaAI Operations ImplementationTechnology Stack
A.8Asset managementModel registry + LoRA adapter managementECR + MLflow Model Registry
A.9Access controlAPI Key management + RBAC + Multi-tenant isolationkgateway + Pod Identity
A.12Operational securityLogging + Monitoring + BackupCloudTrail + AMP/AMG + S3
A.14System development securityPlaybook CI/CD + Automated code reviewArgoCD + Guardrails API
A.16Information security incident managementAutomatic detection + Automatic responseAlerts + Playbook rollback
A.17Business continuityMulti-AZ deployment + AutoscalingEKS + Karpenter

A.14 Implementation: Playbook CI/CD Pipeline

A.16 Incident Management: Auto-Rollback Example
apiVersion: argoproj.io/v1alpha1
kind: Rollout
metadata:
name: inference-api
spec:
strategy:
canary:
analysis:
templates:
- templateName: hallucination-check
args:
- name: threshold
value: "0.05" # Auto-rollback if hallucination rate > 5%

Financial Regulation Mapping

Electronic Financial Supervisory Regulation (전자금융감독규정) Mapping

ArticleContentAI Operations MappingImplementation
Article 15Access control and authorization managementModel API authentication + Audit logsAPI Key + CloudTrail
Article 17Electronic financial transaction data encryptionData encryption + TLSKMS + ALB TLS
Article 34Transaction and transfer limit settingsToken usage limits + Rate Limitingkgateway rate-limit

Article 34 Implementation: Token Usage Limits

apiVersion: gateway.solo.io/v1
kind: RateLimitConfig
metadata:
name: token-limit
spec:
rateLimits:
- actions:
- genericKey:
descriptorValue: "token-usage"
limit:
requestsPerUnit: 100000 # 100K tokens/hour
unit: HOUR

ISMS-P (Korean Personal Information & Information Security Management System) Mapping

ItemRequirementAI Operations MappingImplementation
2.6Access controlAPI Key + RBAC + Multi-factor authenticationPod Identity + MFA
2.9System and service development securityPlaybook version control + GuardrailsGit + Guardrails Stack
2.11Information security incident managementAutomatic incident detection and responseAlerts + Auto rollback
ISMS-P Related: PII Detection and Blocking

PII detection/blocking through Guardrails is a technical control that satisfies ISMS-P personal information processing and access control requirements.

For technical implementation, refer to AI Gateway Guardrails — provides implementation patterns and kgateway/Bifrost integration examples including Microsoft Presidio Korean recognizer, Bedrock Guardrails ApplyGuardrail API, and Guardrails AI DetectPII validator.


Automated Verification CI/CD Pipeline

Pipeline Stage Description

StagePurposeToolAction on Failure
Unit TestsVerify functional integritypytestBlock PR
RAGAS EvalVerify RAG accuracyRAGASBlock PR if below threshold
Guardrails TestVerify PII, hallucination, biasGuardrails AIImmediate failure
Compliance CheckVerify SOC2/ISO27001 controlsCustom scriptNotify audit team
Red-teamingTest adversarial promptsGarakEscalate to security team
Approval GateManual approvalGitHub ActionsWait for approval
Compliance Check Automation Example
def check_compliance(playbook_path):
"""SOC2 CC8.1: Change management control"""
# 1. Verify approvers
approvers = get_pr_approvers()
if len(approvers) < 2:
raise Exception("Requires at least 2 approvers (SOC2 CC8.1)")

# 2. Analyze change impact
affected_models = analyze_affected_models(playbook_path)
if "production" in affected_models:
notify_audit_team(playbook_path)

# 3. Record audit log
log_to_cloudtrail(playbook_path, approvers)

Audit Data Retention Policy

Per-Data-Classification Retention Criteria

DataStorage LocationRetention PeriodAccess AuthorityLegal Basis
Inference tracesLLM Tracing + S33 yearsAudit team, DevOpsISO27001 A.12.4
API call logsCloudTrail + S35 yearsSecurity team, Audit teamElectronic Financial Supervisory Regulation (전자금융감독규정) Article 19
Model change historyGit + ECRPermanentDevOps, ML teamSOC2 CC8.1
GPU metricsAMP + S31 yearOperations teamInternal policy
PII detection logsCloudWatch + S33 yearsSecurity team, Compliance teamISMS-P 2.11

S3 Lifecycle Policy Example

{
"Rules": [
{
"Id": "inference-trace-lifecycle",
"Status": "Enabled",
"Transitions": [
{
"Days": 90,
"StorageClass": "STANDARD_IA"
},
{
"Days": 365,
"StorageClass": "GLACIER"
}
],
"Expiration": {
"Days": 1095
}
}
]
}
Ensuring Audit Data Integrity
  • S3 Object Lock: Prevent deletion (WORM mode)
  • CloudTrail Validation: Verify tampering with aws cloudtrail validate-logs
  • Immutable Trace: Traces in LLM tracing systems are immutable after creation (e.g., Langfuse)

Practical Checklists

SOC2 Audit Preparation

  • CC6.1-6.8: Pod Identity + RBAC configuration complete
  • CC7.1-7.4: LLM Tracing + AMP/AMG monitoring built
  • CC7.3: PagerDuty alerts + Auto rollback configured
  • CC8.1: GitOps + Approval Gate applied

ISO27001 Certification Preparation

  • A.8: MLflow Model Registry built
  • A.9: kgateway + API Key management system
  • A.12: CloudTrail + S3 audit log retention
  • A.14: CI/CD pipeline automated verification
  • A.16: Incident response Playbook created
  • A.17: Multi-AZ + Karpenter autoscaling

Financial Regulation Compliance

  • Electronic Financial Supervisory Regulation (전자금융감독규정) Article 15: API access control
  • Electronic Financial Supervisory Regulation (전자금융감독규정) Article 17: TLS + KMS encryption
  • Electronic Financial Supervisory Regulation (전자금융감독규정) Article 34: Rate Limiting
  • ISMS-P 2.6: MFA applied
  • ISMS-P 2.9: Guardrails API integration
  • ISMS-P 2.11: Automated incident response

References