Skip to content

Compliance Frameworks

Arbitex ships eight pre-built compliance bundles that map regulatory frameworks to DLP detectors, enforcement rules, and audit evidence. Each bundle is a named set of DLP entity types with configurable enforcement tiers. When a bundle is active, its associated detectors scan every AI request and response in real time.

Compliance bundles are managed through the admin UI at Admin → Compliance or via the Compliance Bundles API. Each bundle can be:

  • Activated / Deactivated — toggles all associated DLP rules on or off atomically.
  • Assigned to groups — different user groups can operate under different bundles simultaneously.
  • Versioned — platform upgrades may ship updated bundle definitions; admins review and apply upgrades explicitly.

Bundles use the same DLP rule pipeline as custom rules. A rule’s is_required flag marks it as non-suppressible — it cannot be disabled even if it is shared with another bundle that is deactivated.


Payment Card Industry Data Security Standard — protects cardholder data at rest and in transit.

FieldValue
Regulatory bodyPCI Security Standards Council
Arbitex bundle namePCI-DSS Compliance Bundle
Default stateInactive (must be explicitly activated)

DLP detectors activated

Entity typeDescription
credit_card13–19 digit card numbers (Luhn-validated), all major networks
cvv3–4 digit card verification values in payment context
bank_account_numberUS domestic account numbers, 6–17 digits
ach_dataACH routing + account number pairs

Non-suppressible rules: All four entity types carry is_required=true in the seed bundle. They cannot be individually disabled while the PCI-DSS bundle is active.

Audit evidence generated

Every request triggering a PCI-DSS detector produces an audit log entry with:

  • dlp_triggered: true, dlp_labels: ["credit_card"] (or applicable label)
  • compliance_framework: "PCI-DSS" (populated when rule is bundle-sourced)
  • action_taken: one of block, redact, warn, log
  • Full prompt and response hashes for cardholder data evidence chain

Configuring the bundle

Terminal window
# Activate via API
curl -X POST https://your-platform/api/admin/compliance-bundles/{bundle_id}/activate \
-H "Authorization: Bearer $ADMIN_TOKEN"

To assign the bundle to a specific group (e.g., payment processing team):

Terminal window
curl -X POST https://your-platform/api/admin/groups/{group_id}/compliance-bundles \
-H "Authorization: Bearer $ADMIN_TOKEN" \
-d '{"bundle_id": "<pci-bundle-id>"}'

Compliance notes: PCI-DSS Requirement 3 prohibits storage of sensitive authentication data (SAD) after authorization. The cvv detector enforces this by blocking or redacting CVV values in AI outputs.


Health Insurance Portability and Accountability Act — protects Protected Health Information (PHI).

FieldValue
Regulatory bodyU.S. Department of Health and Human Services
Arbitex bundle nameHIPAA Compliance Bundle
Default stateInactive

DLP detectors activated

Entity typeDescription
health_infoDiagnoses, medications, lab results, clinical terms
ssnUS Social Security Numbers (formatted and unformatted)
namePersonal name patterns in healthcare context
date_of_birthDate of birth in multiple formats

Non-suppressible rules: health_info and ssn carry is_required=true. Name and date-of-birth detectors can be individually configured via the policy engine if organizational policy permits.

Audit evidence generated

  • dlp_labels includes all triggered PHI categories
  • hipaa_phi_detected: true annotation on audit entries (populated by compliance enforcement service)
  • Minimum Necessary Standard metadata: audit records capture which PHI categories appeared in each request, supporting breach risk assessments under the HIPAA Breach Notification Rule

Configuring the bundle

HIPAA bundles are commonly combined with the require_approval action for clinical use cases:

{
"name": "PHI Disclosure Review",
"conditions": [
{"type": "dlp_label", "operator": "contains_any", "value": ["health_info", "ssn"]}
],
"action": {
"type": "require_approval",
"approval_group": "privacy-officers",
"timeout_action": "block",
"timeout_minutes": 60
}
}

Sarbanes-Oxley Act — financial reporting integrity for US public companies.

FieldValue
Regulatory bodySEC / PCAOB
Arbitex bundle nameSOX Compliance Bundle
Default stateInactive

DLP detectors activated

Entity typeDescription
financial_account_numbersGeneral financial account identifiers
employment_infoCompensation, benefits, HR data
contract_numbersContract and agreement identifiers

Non-suppressible rules: financial_account_numbers is is_required=true. Employment info and contract number detectors are required=false to allow organizational discretion.

Audit evidence generated

SOX audit support focuses on the completeness and immutability of the audit trail. Every AI interaction involving financial data generates:

  • Immutable audit log entries (platform uses append-only audit log architecture)
  • financial_data_detected flag for evidence of internal controls testing
  • User identity, timestamps, and session IDs for SOX Section 404 documentation

Gramm-Leach-Bliley Act — financial privacy for US financial institutions.

FieldValue
Regulatory bodyFTC / federal banking agencies
Arbitex bundle nameGLBA Compliance Bundle
Default stateInactive

DLP detectors activated

Entity typeDescription
financial_account_numbersGeneral financial account identifiers
ssnSocial Security Numbers
account_balancesAccount balance and financial position data

Non-suppressible rules: All three entity types are is_required=true under GLBA, reflecting the Safeguards Rule requirement to protect nonpublic personal financial information (NPPI).

Audit evidence generated

  • Safeguards Rule compliance: every access to NPPI-containing content is logged with full user context
  • Annual security program documentation support: audit exports available via the Compliance Export API

General Data Protection Regulation — data protection and privacy for EU residents.

FieldValue
Regulatory bodyEU Data Protection Authorities
Arbitex bundle nameGDPR Compliance Bundle
Default stateInactive

DLP detectors activated

Entity typeDescription
namePersonal names
emailEmail addresses
telephonePhone numbers
ip_addressIPv4 and IPv6 addresses
racial_ethnic_originSpecial category — racial or ethnic origin data
political_opinionsSpecial category — political opinions
religious_beliefsSpecial category — religious or philosophical beliefs
health_infoSpecial category — health data
biometricSpecial category — biometric data for unique identification
geneticSpecial category — genetic data

Non-suppressible rules: The five special category detectors (racial_ethnic_origin, political_opinions, religious_beliefs, biometric, genetic) are is_required=true, reflecting GDPR Article 9 prohibition on processing special categories without explicit lawful basis. Standard personal data detectors (name, email, telephone, ip_address) are is_required=false.

Audit evidence generated

GDPR requires demonstrable accountability (Article 5(2)). Arbitex provides:

  • Processing activity records: every AI interaction with personal data is logged with the legal basis annotation (configurable via policy metadata)
  • Data subject identifiers: email and name detection events support right-of-access and erasure workflows
  • Cross-border transfer logging: user IP geolocation enrichment on audit records supports transfer impact assessments

GDPR-specific configuration

For Article 22 (automated decision-making) use cases, combine the GDPR bundle with warn or require_approval actions and document the legal basis in policy rule descriptions:

{
"name": "GDPR Article 22 Guard",
"description": "Flag automated decisions affecting individuals — legal basis: Article 6(1)(f)",
"conditions": [
{"type": "dlp_label", "operator": "contains_any",
"value": ["racial_ethnic_origin", "health_info", "biometric"]}
],
"action": {"type": "warn", "warn_message": "Special category data detected — review legal basis."}
}

California Consumer Privacy Act — consumer privacy rights for California residents.

FieldValue
Regulatory bodyCalifornia Privacy Protection Agency
Arbitex bundle nameCCPA Compliance Bundle
Default stateInactive

DLP detectors activated

Entity typeDescription
namePersonal names
emailEmail addresses
ssnSocial Security Numbers
geolocationPrecise geolocation data
biometricBiometric data

Non-suppressible rules: ssn and biometric are is_required=true. The remaining three are is_required=false, reflecting that CCPA provides opt-out rights rather than a blanket prohibition.

Audit evidence generated

CCPA audit logs support consumer rights request workflows:

  • Personal information detection logs used to scope data inventory responses to “know” requests
  • Deletion request scoping: audit exports filterable by user identity (see Compliance Export API)

Bank Secrecy Act / Anti-Money Laundering — financial crime prevention for US financial institutions.

FieldValue
Regulatory bodyFinCEN / federal banking agencies
Arbitex bundle nameBSA/AML Compliance Bundle
Default stateInactive

DLP detectors activated

Entity typeDescription
ssnSocial Security Numbers (Customer Due Diligence)
bank_account_numberBank account numbers
financial_account_numbersBroader financial account identifiers

Non-suppressible rules: All three are is_required=true, reflecting BSA’s mandatory recordkeeping and reporting requirements under 31 CFR 1010.

Audit evidence generated

  • Customer Due Diligence (CDD) support: SSN and account detection events logged with full context for FinCEN 314(b) information sharing
  • Suspicious Activity Report (SAR) workflow support: audit exports can be filtered by time range and entity type for BSA/AML investigations
  • Five-year retention alignment: Arbitex audit logs are immutable; configure your retention policy at Admin → Data Retention to meet BSA 31 CFR 1010.430 requirements

SEC Rule 17a-4 — electronic records retention for broker-dealers.

FieldValue
Regulatory bodyU.S. Securities and Exchange Commission
Arbitex bundle nameSEC 17a-4 Compliance Bundle
Default stateInactive

DLP detectors activated

Entity typeDescription
emailEmail addresses (business communications)
financial_account_numbersSecurities account identifiers
contract_numbersTrade agreement and contract references

Non-suppressible rules: All three are is_required=true, reflecting Rule 17a-4’s requirement that broker-dealer records be retained in a non-rewriteable, non-erasable format.

Audit evidence generated

SEC 17a-4 imposes strict requirements on the audit trail itself:

  • Write-once audit records: Arbitex audit logs are append-only with no update path
  • Indexing and access: all audit log entries are indexed by date, user, and entity type for SEC examination access
  • WORM compliance: when paired with outpost air-gap mode and SQLite local audit queue, records are durable even during network outages — see Air-Gap Deployment

Terminal window
# List all bundles (includes seeded frameworks)
curl https://your-platform/api/admin/compliance-bundles \
-H "Authorization: Bearer $ADMIN_TOKEN"
# Activate a specific bundle
curl -X POST https://your-platform/api/admin/compliance-bundles/{id}/activate \
-H "Authorization: Bearer $ADMIN_TOKEN"

Activating a bundle sets enabled=true on all its associated DLP rules atomically and fires a bundle_state_change webhook.

Organizations can operate different bundles for different teams (e.g., HIPAA for clinical staff, PCI-DSS for payment processors). Group-level assignments override the global active bundle for members of that group.

See Admin → Groups → [group] → Compliance to configure per-group bundle assignments, or use the Groups API.

When Arbitex ships updated bundle definitions (e.g., new entity types for an updated regulatory standard), an upgrade becomes available:

Terminal window
# Check for upgrade
curl https://your-platform/api/admin/compliance-bundles/{id} \
-H "Authorization: Bearer $ADMIN_TOKEN"
# Returns: "upgrade_available": true
# Apply upgrade
curl -X POST https://your-platform/api/admin/compliance-bundles/{id}/upgrade \
-H "Authorization: Bearer $ADMIN_TOKEN"
# Returns: rules_added, rules_removed, rules_preserved counts

Upgrades preserve any custom rules you have added to the bundle. Seed rule changes are applied while custom rules are retained.

Seeded bundles (is_seeded=true) cannot be deleted or renamed. You can create custom bundles alongside them:

Terminal window
curl -X POST https://your-platform/api/admin/compliance-bundles \
-H "Authorization: Bearer $ADMIN_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"name": "Internal Data Classification",
"description": "Internal sensitivity tiers",
"regulatory_framework": "internal",
"version": "1.0",
"enabled": false
}'

All compliance-related events are available via the Compliance Export API and the Compliance Reports API. Use the framework filter to scope exports to a specific bundle:

Terminal window
curl "https://your-platform/api/admin/compliance/export?framework=HIPAA&format=json&from=2026-01-01T00:00:00Z" \
-H "Authorization: Bearer $ADMIN_TOKEN"

For ongoing monitoring, configure alerts on dlp_triggered events using the Alerts API.