OGuardAI
Security

Compliance Controls Mapping

Article-by-article mapping of OGuardAI controls to GDPR, HIPAA, SOC 2, and PCI DSS requirements

GDPR Alignment

GDPR ArticleRequirementOGuardAI ControlHow to Verify
Art. 5(1)(c)Data minimizationTokenization removes PII from LLM contextTransform API returns safe_text without PII
Art. 5(1)(e)Storage limitationSealed sessions auto-expire, no server-side retentionCheck session TTL configuration
Art. 25Data protection by designTrust boundary model, sealed sessionsSecurity whitepaper Section 1
Art. 28Processor obligationsSelf-hosted, no subprocessors in sealed modeDeployment guide
Art. 30Records of processingStructured audit events per operationAudit module, diagnostics endpoint
Art. 32Security of processingAES-256-GCM encryption, key rotationSecurity whitepaper Section 2
Art. 17Right to erasureSessions auto-expire, no server-side retentionData retention doc
Art. 20Data portabilitySealed sessions are portable (client-held)Session model
Art. 35Data protection impact assessmentAudit trail, policy validation, dry-run modeAdmin endpoints

HIPAA Alignment

HIPAA SectionRequirementOGuardAI ControlImplementation Detail
SS 164.312(a)(1)Access controlJWT/API key auth + scope modelAuth middleware with Admin/Transform/Rehydrate/Detect/Policy scopes
SS 164.312(a)(2)(iv)Encryption/decryptionAES-256-GCM sealed sessionsSession crate with AEAD encryption
SS 164.312(b)Audit controlsStructured audit eventsAudit module emits events via tracing
SS 164.312(c)(1)Integrity controlsAEAD authentication tag on session blobsTamper detection built into AES-GCM
SS 164.312(e)(1)Transmission securityTLS support, encrypted session stateDeployment guide covers TLS setup
SS 164.502(b)Minimum necessaryTokenization + policy-based restore modes6 restore modes: full, partial, masked, formatted, abstract, none
SS 164.308(a)(5)(ii)Security awarenessPolicy validation and dry-run endpointsAdmin can preview impact before changes

SOC 2 Type II Alignment

ControlDescriptionOGuardAI FeatureEvidence
CC6.1Logical accessAuth middleware with scopesAPI key/JWT validation on every request
CC6.3Role-based accessAdmin/Transform/Rehydrate/Detect/Policy scopesScope-based authorization checks
CC6.6System boundary protectionTrust boundary modelPII never leaves runtime boundary
CC6.7Restrict data mobilityPolicy engine controls entity exposurePer-entity-type action rules
CC7.1Detect security eventsPrompt security engine, output guardInput/output scanning for injection and PII leaks
CC7.2System monitoringStructured audit events, diagnostics endpointAudit trail, health checks
CC8.1Change managementPolicy diffing, validation endpointPreview impact of policy changes before deployment
CC9.1Risk mitigationMulti-layer detection (regex + NLP)Builtin + advanced detector modes

PCI DSS Alignment (Where Applicable)

PCI DSS RequirementOGuardAI Control
3.4 -- Render PAN unreadableCredit card tokenization with Luhn validation
3.5 -- Protect cryptographic keysSession key derived from configured secret, key rotation supported
10.1 -- Audit trailsStructured audit events per operation
10.3 -- Record audit trail entriesTimestamp, tenant, entity types, policy, duration in every event

Audit Event Schema

Every OGuardAI operation emits a structured audit event:

{
  "timestamp_unix": 1700000000,
  "event_type": "transform",
  "tenant_id": "tenant_acme",
  "session_id": "550e8400-...",
  "policy_applied": "gdpr-strict",
  "entity_types": ["email", "phone"],
  "entity_count": 3,
  "entities_blocked": 1,
  "entities_tokenized": 2,
  "duration_ms": 12.5,
  "detector_mode": "builtin",
  "output_guard_triggered": false,
  "prompt_security_triggered": false
}

Key property: No raw PII values appear in audit events.

Audit Export

Audit events are emitted as structured tracing events on the guardai::audit target. They can be collected by any log aggregation system:

  • ELK Stack: Filebeat -> Logstash -> Elasticsearch -> Kibana
  • Datadog: Datadog Agent with JSON log parsing
  • Splunk: Universal Forwarder with JSON sourcetype
  • AWS CloudWatch: CloudWatch Logs agent
  • Google Cloud Logging: Fluentd/Fluent Bit

Configure your tracing subscriber to output JSON format for easy parsing:

RUST_LOG=guardai::audit=info oguardai-server run

Policy Governance Events

In addition to operational audit events, OGuardAI emits policy governance events:

Event TypeWhen EmittedWhat It Records
policy_loadedServer startupEach policy loaded from the policies directory
policy_validatedAdmin validation endpointProposed policy validation result
policy_diff_previewAdmin validation with diffChanges between current and proposed policies

These events create an immutable record of policy state changes over time.

Verification Checklist

Use this checklist to verify OGuardAI compliance controls in your deployment:

  • Sealed session mode enabled (default)
  • Session TTL configured appropriately
  • TLS enabled for all endpoints
  • Auth mode set to ApiKey or Jwt (not Dev)
  • Audit events routed to SIEM/log aggregator
  • Log rotation and retention configured
  • Policy directory version-controlled (git)
  • Policy validation run before deployments
  • Encryption key rotation schedule established
  • Output guard enabled for sensitive workflows
  • Prompt security enabled (default)