Skip to content

Commit 8a40f2b

Browse files
Merge pull request #7 from quantumpipes/compliance-expansion
2 parents 335da28 + 281732e commit 8a40f2b

File tree

19 files changed

+559
-210
lines changed

19 files changed

+559
-210
lines changed

README.md

Lines changed: 24 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ Every AI action produces a Capsule — a tamper-evident, content-addressable rec
88

99
[![License](https://img.shields.io/badge/License-Apache_2.0-blue.svg)](https://opensource.org/licenses/Apache-2.0)
1010
[![CPS](https://img.shields.io/badge/CPS-v1.0-orange.svg)](./spec/)
11-
[![Conformance](https://img.shields.io/badge/Conformance-16_vectors-brightgreen.svg)](./conformance/)
11+
[![Conformance](https://img.shields.io/badge/Conformance-16_vectors-ff69b4.svg)](./conformance/)
1212
[![FIPS](https://img.shields.io/badge/Crypto-FIPS_202%20·%20186--5%20·%20204-purple.svg)](#cryptographic-seal)
1313
[![Coverage](https://img.shields.io/badge/Coverage-100%25-brightgreen.svg)](./reference/python/)
1414

@@ -229,13 +229,35 @@ See the [TypeScript reference documentation](./reference/typescript/) for the fu
229229

230230
---
231231

232+
## Compliance
233+
234+
Capsule maps to 11 regulatory frameworks at the protocol level. Each mapping documents which controls the protocol satisfies and which require complementary application-level controls.
235+
236+
| Framework | Controls | Focus |
237+
|---|---|---|
238+
| [NIST SP 800-53](./docs/compliance/nist-sp-800-53.md) | AU-2 through AU-12, SC-13, SC-28, SI-7 | Audit, integrity, crypto |
239+
| [NIST AI RMF](./docs/compliance/nist-ai-rmf.md) | GOVERN, MAP, MEASURE, MANAGE | AI risk management |
240+
| [EU AI Act](./docs/compliance/eu-ai-act.md) | Articles 12, 13, 14 | Record-keeping, transparency, oversight |
241+
| [SOC 2](./docs/compliance/soc2.md) | CC6.1, CC7.2, CC7.3, CC7.4, CC8.1 | Trust Services Criteria |
242+
| [ISO 27001](./docs/compliance/iso27001.md) | A.8.15 through A.8.25 | Annex A controls |
243+
| [HIPAA](./docs/compliance/hipaa.md) | §164.308, §164.312 | Security Rule safeguards |
244+
| [GDPR](./docs/compliance/gdpr.md) | Articles 5, 25, 30, 32, 35 | Data protection |
245+
| [PCI DSS](./docs/compliance/pci-dss.md) | Req 10, 11.5, 11.6 | Logging, change detection |
246+
| [FedRAMP](./docs/compliance/fedramp.md) | AU-9(3), AU-10, SI-7, CM-3 | Federal cloud |
247+
| [FINRA](./docs/compliance/finra.md) | SEC 17a-4, REC-2, Rule 3110 | Financial recordkeeping |
248+
| [CMMC](./docs/compliance/cmmc.md) | AU.L2-3.3.x, SC.L2-3.13.x | DoD CUI protection |
249+
250+
See the [compliance overview](./docs/compliance/) for FIPS algorithm details and scope.
251+
252+
---
253+
232254
## Documentation
233255

234256
| Document | Audience |
235257
|---|---|
236258
| [Architecture](./docs/architecture.md) | Developers, Auditors |
237259
| [Security Evaluation](./docs/security.md) | CISOs, Security Teams |
238-
| [Compliance Mapping](./docs/compliance.md) | Regulators, GRC |
260+
| [Compliance Mapping](./docs/compliance/) | Regulators, GRC |
239261
| [Why Capsules](./docs/why-capsules.md) | Decision-Makers, Architects |
240262
| [Implementor's Guide](./docs/implementors-guide.md) | SDK Authors |
241263

docs/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ These documents explain the Capsule Protocol — why it exists, how it works, an
99
| [Why Capsules](./why-capsules.md) | Decision-Makers, Architects | The case for cryptographic AI memory |
1010
| [Architecture](./architecture.md) | Developers, Auditors | 6-section model, sealing, hash chain |
1111
| [Security Evaluation](./security.md) | CISOs, Security Teams | Cryptographic guarantees and key management |
12-
| [Compliance Mapping](./compliance.md) | Regulators, GRC | NIST, EU AI Act, SOC 2, ISO 27001 |
12+
| [Compliance Mapping](./compliance/) | Regulators, GRC | NIST, EU AI Act, SOC 2, ISO 27001, HIPAA, GDPR |
1313
| [Implementor's Guide](./implementors-guide.md) | SDK Authors | How to build a conformant implementation |
1414

1515
## Normative Specification

docs/architecture.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -369,7 +369,7 @@ Capsules can form parent-child hierarchies: `WORKFLOW` (parent) -> `AGENT` (chil
369369

370370
- [Why Capsules](./why-capsules.md) — The case for cryptographic AI memory
371371
- [Security Evaluation](./security.md) — Cryptographic guarantees for CISOs
372-
- [Compliance Mapping](./compliance.md) — Regulatory framework alignment
372+
- [Compliance Mapping](./compliance/) — Regulatory framework alignment
373373
- [CPS Specification](../spec/) — Protocol rules for SDK authors
374374
- [Python Reference](../reference/python/) — Python API reference and quickstart
375375

docs/compliance.md

Lines changed: 0 additions & 203 deletions
This file was deleted.

docs/compliance/README.md

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
# Regulatory Compliance Mapping
2+
3+
> **How the Capsule protocol maps to the frameworks your auditors care about.**
4+
5+
---
6+
7+
## Scope
8+
9+
This directory maps **protocol-level** capabilities to regulatory controls. Every mapping describes what the Capsule Protocol Specification (CPS) itself provides: structured records, cryptographic sealing, hash chain integrity, and cross-language verification.
10+
11+
Application-level controls (access management, network security, operational procedures) are the responsibility of the deployment environment, not the protocol.
12+
13+
---
14+
15+
## FIPS Algorithm Compliance
16+
17+
| Algorithm | FIPS Standard | Status | Capsule Usage |
18+
|---|---|---|---|
19+
| SHA3-256 | FIPS 202 (SHA-3) | Published August 2015 | Content hashing for every Capsule |
20+
| Ed25519 | FIPS 186-5 (Digital Signatures) | Published February 2023 | Required signature on every Capsule |
21+
| ML-DSA-65 | FIPS 204 (ML-DSA) | Published August 2024 | Optional post-quantum dual signature |
22+
23+
All three algorithms are NIST-standardized. No deprecated or non-standard cryptography is used.
24+
25+
---
26+
27+
## Framework Mappings
28+
29+
| Framework | Controls Mapped | Document |
30+
|---|---|---|
31+
| [NIST SP 800-53 Rev. 5](./nist-sp-800-53.md) | AU-2 through AU-12, SC-13, SC-28, SI-7 | Audit, integrity, crypto |
32+
| [NIST AI RMF 1.0](./nist-ai-rmf.md) | GOVERN, MAP, MEASURE, MANAGE | AI risk management |
33+
| [EU AI Act](./eu-ai-act.md) | Articles 12, 13, 14 | Record-keeping, transparency, oversight |
34+
| [SOC 2 Type II](./soc2.md) | CC6.1, CC7.2, CC7.3, CC7.4, CC8.1 | Trust Services Criteria |
35+
| [ISO 27001:2022](./iso27001.md) | A.8.15, A.8.16, A.8.17, A.8.24, A.8.25 | Annex A controls |
36+
| [HIPAA](./hipaa.md) | §164.308, §164.312 | Security Rule safeguards |
37+
| [GDPR](./gdpr.md) | Articles 5, 25, 30, 32, 35 | Data protection principles |
38+
| [PCI DSS v4.0](./pci-dss.md) | Req 10, Req 11.5, Req 11.6 | Logging, monitoring, change detection |
39+
| [FedRAMP](./fedramp.md) | AU-9(3), AU-10, SI-7(1-7), SC-8(1), SC-28(1), CM-3 | Federal cloud authorization |
40+
| [FINRA](./finra.md) | SEC 17a-4, REC-2, Rule 3110 | Financial recordkeeping, supervision |
41+
| [CMMC 2.0](./cmmc.md) | AU.L2-3.3.x, SC.L2-3.13.x, AC.L2-3.1.12 | DoD contractor CUI protection |
42+
43+
---
44+
45+
## Cross-Language Conformance
46+
47+
Capsule sealed in any language can be verified in any other. The Capsule Protocol Specification (CPS) defines:
48+
49+
- Byte-level canonical JSON serialization rules
50+
- 16 golden test vectors covering all CapsuleTypes, Unicode, fractional timestamps, chain sequences, empty vs null, deep nesting, and failure paths
51+
- SHA3-256 hash determinism across implementations
52+
53+
Python and TypeScript reference implementations are available now. All conformant implementations produce byte-identical canonical JSON and matching SHA3-256 hashes for the golden test vectors.
54+
55+
See [CPS Specification](../../spec/) for protocol details.
56+
57+
---
58+
59+
## Related Documentation
60+
61+
- [Security Evaluation](../security.md) -- Cryptographic architecture, key management, attack surface
62+
- [Architecture](../architecture.md) -- 6-section model, sealing process, hash chain
63+
- [CPS Specification](../../spec/) -- Protocol rules and golden test vectors

0 commit comments

Comments
 (0)