Skip to content

Compliance Frameworks Reference

Arbitex ships 8 Compliance Bundles — pre-built Policy Packs mapped to specific regulatory frameworks. This reference describes what each framework requires, what Arbitex detects and enforces, and how to activate coverage.

For each framework, Arbitex provides:

  • A Compliance Bundle with detection patterns and policy rules mapped to the framework
  • An audit trail that captures framework-referenced matches (e.g., PCI-DSS Requirement 3.4)
  • SIEM export of enforcement events in OCSF format for your compliance team

Policy actions and their compliance meaning

Section titled “Policy actions and their compliance meaning”

When a Compliance Bundle rule matches, the policy engine applies one of these terminal actions. Each action has a distinct compliance interpretation:

ActionBehaviorCompliance signal
BLOCKRequest rejected before reaching the modelPreventive control — data never transmitted
CANCELCompletion cancelled; user prompted to reviseDetective + corrective control — user must acknowledge
REDACTMatched content replaced before model sees itDe-identification control
ALLOW_WITH_OVERRIDERequest logged and allowed after user attestationGovernance control — creates an accountable exception record
PROMPTGovernance challenge interposed before proceedingApproval workflow control

All enforcement actions — regardless of type — produce a security_finding audit log entry with the framework reference, rule ID, pack ID, and matched entity category. Audit entries do not store the matched content itself.


Enforcement events are exported to SIEM in OCSF v1.1 format. Each Compliance Bundle enforcement action maps to OCSF class 2001 — Security Finding (category: Findings).

Authentication events (login, MFA, SSO) from the same audit trail export as OCSF class 3002 — Authentication Activity. Administrative changes (policy updates, user management) export as OCSF class 3001 — Account Change.

Your compliance team can filter SIEM dashboards by:

  • class_uid = 2001 — all enforcement events (framework matches, DLP blocks, CredInt hits)
  • cloud.account.uid = <org_id> — events for a specific organization
  • activity_name — specific action type (e.g., dlp_block, policy_block)
  • metadata.framework_reference — specific regulatory reference (e.g., PCI-DSS Requirement 3.4)

See Audit Data Model Reference for the full field-level OCSF mapping.


Bundle ID: pci_dss Standard: Payment Card Industry Data Security Standard

PCI-DSS applies to any system that stores, processes, or transmits payment card data. An AI Gateway that proxies employee or customer conversations creates a risk of cardholder data appearing in prompts or completions.

The pci_dss bundle includes inline DLP detection patterns for:

  • Primary Account Numbers (PANs) — all major card network formats (Visa, Mastercard, Amex, Discover) with Luhn checksum validation
  • Card verification values (CVV/CVC) in proximity to PANs
  • Card expiration dates

Detection runs in the DLP pipeline before policy evaluation. Findings are consumed by bundle rules.

Requirement areaArbitex control
Req 3 — Protect stored cardholder dataBlock transmission of PANs through the Gateway. Matched content category logged (not the content itself).
Req 3.4 — Render PAN unreadableBLOCK action prevents PAN from reaching downstream model or user. Audit log references PCI-DSS Requirement 3.4.
Req 10 — Track and monitor accessTamper-evident audit trail with HMAC chain. All API requests logged with org, user, action.
Req 10.5 — Protect audit trails90-day active + 2-year archive retention. HMAC chain detects modification.
Terminal window
POST https://api.arbitex.ai/api/admin/orgs/{org_id}/compliance/bundles
Authorization: Bearer arb_live_your-api-key-here
Content-Type: application/json
{ "bundle_id": "pci_dss", "enabled": true }

Then add bundle_pci_dss to your policy chain. See Compliance Bundles for the full two-step activation procedure.


Bundle ID: hipaa Standard: Health Insurance Portability and Accountability Act (Privacy + Security Rules)

HIPAA applies to covered entities (healthcare providers, health plans, clearinghouses) and their business associates. AI Gateways used by healthcare organizations create risk of Protected Health Information (PHI) appearing in prompts or completions.

The hipaa bundle includes inline DLP detection patterns for the 18 HIPAA Safe Harbor identifiers, including:

  • Patient names in clinical context
  • Medical record numbers
  • Dates of service, birth dates, admission/discharge dates
  • Geographic subdivisions below state level
  • Account numbers, certificate/license numbers
  • Device identifiers, URLs, IP addresses in clinical context
  • Biometric identifiers, full-face photographs
Rule areaArbitex control
45 CFR § 164.312 — Technical safeguardsBlock transmission of PHI. Enforcement action logged with framework reference.
45 CFR § 164.502 — Uses and disclosuresBLOCK prevents PHI disclosure to model providers or end users outside permitted use.
45 CFR § 164.312(b) — Audit controlsComplete audit trail of all requests; PHI detections logged by category (not content).
Minimum Necessary standardDetection at content level; only the matched category is retained in audit, not the content.
Terminal window
{ "bundle_id": "hipaa", "enabled": true }

Bundle ID: gdpr Standard: EU General Data Protection Regulation

GDPR applies to processing of personal data of EU data subjects, regardless of where the processing organization is located. AI systems that process EU resident data through a Gateway are in scope.

The gdpr bundle includes inline DLP detection patterns for EU personal data categories:

  • Names and contact information (email, phone, postal address)
  • National identification numbers (EU member state formats)
  • EU financial identifiers (IBAN)
  • IP addresses (treated as personal data under GDPR)
  • Special categories: health data patterns, religious/political affiliation indicators
ArticleArbitex control
Art. 5(1)(f) — Integrity and confidentialityEncryption in transit; BLOCK action prevents unauthorized disclosure.
Art. 25 — Data protection by designPolicy Engine enforces data minimization at the application layer. PROMPT governance for sensitive operations.
Art. 30 — Records of processingAudit trail with per-request logging. SIEM export provides the organization’s record of processing activity.
Art. 32 — Security of processingTLS everywhere; HMAC-chained audit logs; private endpoints for all data stores.
Art. 5(1)(e) — Storage limitationArbitex does not retain prompt/completion content. Audit entries log category, not content.
Terminal window
{ "bundle_id": "gdpr", "enabled": true }

Bundle ID: glba Standard: Gramm-Leach-Bliley Act (Financial Privacy and Safeguards Rules)

GLBA applies to financial institutions — banks, lenders, insurance companies, investment advisors. The Safeguards Rule requires protecting customer nonpublic personal information (NPI).

The glba bundle targets financial customer NPI patterns:

  • Account numbers and routing numbers
  • Social Security Numbers
  • Customer names with financial account context
  • Income and financial history indicators
Safeguards Rule requirementArbitex control
§314.4(b) — Designate a qualified individualNot applicable to Arbitex. Organizational governance.
§314.4(c) — Risk assessmentArbitex audit trail provides the AI system risk signal. Detected NPI transmissions are logged for risk review.
§314.4(d) — Safeguards implementationBLOCK action prevents NPI transmission through the Gateway. Detection patterns cover GLBA-defined NPI categories.
§314.4(h) — Monitor, test, respondSIEM integration exports GLBA-relevant enforcement events in OCSF format for your security team.
Terminal window
{ "bundle_id": "glba", "enabled": true }

Bundle ID: sox Standard: Sarbanes-Oxley Act (Sections 302 and 404)

SOX applies to public companies and their subsidiaries. Section 404 requires management assessment of internal controls over financial reporting (ICFR). AI systems used by finance teams are in scope if they process or generate financial reporting data.

The sox bundle targets financial reporting data categories:

  • Internal financial figures in draft reporting context
  • Material nonpublic information (MNPI) indicators
  • Earnings guidance and forecast language
  • Audit communication patterns
Control areaArbitex control
ICFR — Information technology general controlsAudit trail for all AI interactions involving financial data. HMAC chain provides tamper evidence.
Access controlsPolicy Engine restricts financial data access by group. Model access controls limit which LLM providers receive sensitive financial prompts.
Change managementAudit log captures policy chain changes with admin ID and timestamp.
MonitoringSIEM export of enforcement events enables continuous monitoring of AI system behavior.
Terminal window
{ "bundle_id": "sox", "enabled": true }

Bundle ID: bsa_aml Standard: Bank Secrecy Act / Anti-Money Laundering

BSA/AML requirements apply to financial institutions, money services businesses, and broker-dealers. AI systems used in customer communications or transaction processing are in scope for suspicious activity monitoring obligations.

The bsa_aml bundle targets patterns associated with suspicious activity reporting:

  • Transaction amounts and account identifiers in structured patterns
  • Currency transaction report (CTR) threshold indicators ($10,000+)
  • Structuring language indicators
  • High-risk jurisdiction references
  • Correspondent banking and wire transfer identifiers
BSA requirementArbitex control
Suspicious Activity ReportingSuspicious patterns in AI interactions are logged with matched category and rule reference. Exported to SIEM for compliance team review.
Customer Identification ProgramSensitive identification data detected in prompts triggers BLOCK or PROMPT action depending on configuration.
RecordkeepingAudit trail retains enforcement event records for the required minimum retention period (5 years for BSA). Ensure SIEM retention is configured accordingly.
Terminal window
{ "bundle_id": "bsa_aml", "enabled": true }

Bundle ID: ccpa Standard: California Consumer Privacy Act (as amended by CPRA)

CCPA applies to for-profit businesses operating in California that meet certain revenue or data processing thresholds. AI systems processing California consumer personal information are in scope.

The ccpa bundle targets California consumer personal information categories:

  • Identifiers (name, email, IP address, account number, SSN)
  • Commercial information (purchasing records, financial data)
  • Biometric information
  • Geolocation data
  • Professional and employment information
  • Sensitive personal information (SPI) categories under CPRA
CCPA/CPRA provisionArbitex control
Right to Know / Right to DeleteArbitex does not retain prompt/completion content. Audit entries log category, not PI content.
Data minimization (CPRA § 1798.100(a)(3))Policy Engine enforces purpose limitation at the AI layer. Groups with different authorized purposes can have different policy rules.
Security obligation (§ 1798.150)Encryption in transit and at rest. Audit trail for all processing of consumer PI.
Sensitive PI restrictions (CPRA)BLOCK action prevents unauthorized use or disclosure of CCPA sensitive PI categories.
Terminal window
{ "bundle_id": "ccpa", "enabled": true }

Bundle ID: sec_17a4 Standard: SEC Rule 17a-4 (broker-dealer recordkeeping)

SEC Rule 17a-4 applies to registered broker-dealers and imposes strict requirements for electronic record retention — immutability, indexing, and third-party audit access.

The sec_17a4 bundle targets broker-dealer business communications and records:

  • Trade confirmation and order execution patterns
  • Customer account communication markers
  • Research report and recommendation indicators
  • Regulatory correspondence patterns
Rule requirementArbitex control
17a-4(f) — Electronic storageAudit trail with HMAC chain provides tamper-evidence. Records retained 90-day active + 2-year archive. Ensure SIEM retention covers the full required period (3 years for most records, 6 years for certain books).
Non-rewritable, non-erasableHMAC chain detects modification. Archive tier in Azure Log Analytics provides immutable storage.
IndexingAudit entries are structured JSON with consistent field schema — indexable by SIEM.
Third-party accessSIEM export via OCSF provides the mechanism for designated third-party access to records.
Terminal window
{ "bundle_id": "sec_17a4", "enabled": true }

Organizations with overlapping regulatory obligations can activate multiple bundles simultaneously. Each bundle occupies a position in your policy chain. Use sequence numbers to control evaluation order.

Terminal window
PUT https://api.arbitex.ai/api/admin/orgs/{org_id}/policy/chain
Authorization: Bearer arb_live_your-api-key-here
Content-Type: application/json
{
"combining_algorithm": "first_applicable",
"packs": [
{ "pack_id": "bundle_hipaa", "sequence": 1 },
{ "pack_id": "bundle_pci_dss", "sequence": 2 },
{ "pack_id": "bundle_glba", "sequence": 3 },
{ "pack_id": "pack_01HZ_CUSTOM", "sequence": 10 }
]
}

A healthcare finance organization might activate hipaa, pci_dss, and glba simultaneously, with all three bundles evaluating before custom organizational packs.