Skip to content

Compliance Frameworks Reference

Arbitex ships 8 Compliance Bundles — pre-built Policy Packs with detection patterns and enforcement rules mapped to specific regulatory frameworks. This reference describes what each framework requires, how Arbitex controls address those requirements, and which Bundle to activate.


Each Compliance Bundle consists of:

  1. DLP detection patterns — Regex, NER, and contextual patterns targeting framework-specific data categories
  2. Policy rules — Enforcement actions (BLOCK, REDACT, CANCEL, ALLOW_WITH_OVERRIDE) mapped to rule conditions
  3. Audit references — Every enforcement action logs the specific framework requirement referenced (e.g., PCI-DSS Requirement 3.4)

Bundles activate through the Policy Engine and occupy a position in your policy chain. Multiple bundles can be active simultaneously for organizations with overlapping regulatory obligations.

StatusMeaning
ActiveControl is in place in the current release
PlannedControl is designed and on the roadmap; not yet available
OrganizationalRequirement that falls outside Arbitex scope; your organization is responsible

Bundle ID: pci_dss Standard: Payment Card Industry Data Security Standard v4.0 Scope: Any system that stores, processes, or transmits payment card data. An AI Gateway that proxies employee or customer conversations creates risk of cardholder data (PANs, CVVs) appearing in prompts.

The pci_dss bundle detects:

  • Primary Account Numbers (PANs) — all major card networks (Visa, Mastercard, Amex, Discover) with Luhn checksum validation
  • Card verification values (CVV/CVC) in proximity to PANs
  • Card expiration dates in card-context patterns
PCI-DSS RequirementArbitex controlStatus
Req 3 — Protect stored cardholder dataBLOCK action prevents PAN transmission through Gateway; matched category logged, content not retainedActive
Req 3.4 — Render PAN unreadableBLOCK prevents PAN from reaching downstream model; audit log references PCI-DSS Requirement 3.4Active
Req 6.4 — Protect web-facing applicationsCloudflare WAF with OWASP ruleset + custom AI proxy rules; mTLS on all service connectionsActive
Req 8 — Identify users and authenticateAPI key authentication + RS256 JWT; SAML SSO; MFA enforced per org policyActive
Req 8.6 — MFA for all accessMFA policy enforced at authentication layer; FIDO2/TOTP/SMS supportedActive
Req 10 — Track and monitor all accessTamper-evident HMAC-chained audit trail; all API requests logged with org, user, action, timestampActive
Req 10.3.2 — Protect audit logs90-day active + 2-year archive; HMAC chain detects modification; SIEM export for long-term retentionActive
Req 10.5 — Retain audit logs minimum 12 months90-day Arbitex retention; SIEM integration required for full 12-month retentionActive
BYOK / customer key managementBring Your Own Key (Epic H)Planned
Terminal window
POST https://api.arbitex.ai/api/admin/orgs/{org_id}/compliance/bundles
Authorization: Bearer arb_live_your-api-key
Content-Type: application/json
{ "bundle_id": "pci_dss", "enabled": true }

Then add bundle_pci_dss to your policy chain. See Compliance Bundles for the two-step activation procedure.


Bundle ID: hipaa Standard: Health Insurance Portability and Accountability Act — Privacy Rule + Security Rule Scope: Covered entities (healthcare providers, health plans, clearinghouses) and business associates. AI Gateways used by healthcare organizations create risk of Protected Health Information (PHI) appearing in prompts.

The hipaa bundle detects all 18 HIPAA Safe Harbor identifiers:

  • Patient names in clinical context
  • Medical record numbers, health plan beneficiary numbers
  • Dates of service, birth dates, admission/discharge dates
  • Geographic subdivisions below state level (ZIP codes, street addresses)
  • Account numbers, certificate/license numbers
  • Device identifiers, URLs, IP addresses in clinical context
  • Biometric identifiers, full-face photographs
HIPAA Rule / CFR ReferenceArbitex controlStatus
45 CFR § 164.312 — Technical safeguardsBLOCK prevents PHI transmission; enforcement logged with framework referenceActive
45 CFR § 164.502 — Uses and disclosuresBLOCK prevents PHI disclosure to model providers or users outside permitted useActive
45 CFR § 164.312(b) — Audit controlsComplete audit trail; PHI detections logged by category only, content not retainedActive
45 CFR § 164.312(e)(1) — Transmission securityTLS 1.2+ everywhere; mTLS on internal services and Outpost connectionsActive
Minimum Necessary standardOnly matched category retained in audit, not PHI content itselfActive
45 CFR § 164.314 — BAA requirementsBusiness Associate Agreement available; contact account teamOrganizational
BYOK for PHI data encryptionBring Your Own Key (Epic H)Planned
Terminal window
{ "bundle_id": "hipaa", "enabled": true }

Bundle ID: gdpr Standard: EU General Data Protection Regulation (Regulation 2016/679) Scope: Processing of personal data of EU data subjects, regardless of where the processing organization is located. AI systems processing EU resident data through a Gateway are in scope.

The gdpr bundle detects EU personal data categories:

  • Names, email addresses, phone numbers, postal addresses
  • National identification numbers (EU member state formats)
  • EU financial identifiers (IBAN)
  • IP addresses (treated as personal data under GDPR)
  • Special category data: health indicators, religious/political affiliation patterns
GDPR ArticleArbitex controlStatus
Art. 5(1)(c) — Data minimizationPolicy Engine enforces purpose limitation at AI layer; REDACT removes personal data before model sees itActive
Art. 5(1)(e) — Storage limitationArbitex does not retain prompt/completion content; audit entries log category, not contentActive
Art. 5(1)(f) — Integrity and confidentialityEncryption in transit (TLS 1.2+); HMAC-chained audit logs; BLOCK prevents unauthorized disclosureActive
Art. 25 — Data protection by designDLP pipeline runs before model invocation; policy controls enforced before data leaves tenant boundaryActive
Art. 30 — Records of processingAudit trail with per-request logging; SIEM export provides records of processing activityActive
Art. 32 — Security of processingTLS everywhere; application-layer Fernet encryption; private endpoints; HMAC audit integrityActive
Art. 33 — Breach notificationAudit trail provides detection evidence; incident response procedures are organizationalOrganizational
Art. 44–46 — International transfersAudit trail records cross-border data flows; SCCs and transfer assessments are organizationalOrganizational
BYOK / data sovereigntyBring Your Own Key (Epic H)Planned
Terminal window
{ "bundle_id": "gdpr", "enabled": true }

Bundle ID: glba Standard: Gramm-Leach-Bliley Act — Financial Privacy Rule + Safeguards Rule (16 CFR Part 314) Scope: Financial institutions — banks, lenders, insurance companies, investment advisors. The Safeguards Rule requires protecting customer nonpublic personal information (NPI).

The glba bundle detects financial NPI categories:

  • Account numbers and routing numbers
  • Social Security Numbers in financial context
  • Customer names combined with financial account context
  • Income, credit, and financial history indicators
GLBA Safeguards Rule SectionArbitex controlStatus
§314.4(c) — Risk assessmentAudit trail provides AI system risk signal; detected NPI transmission events logged for risk reviewActive
§314.4(d) — Safeguards — access controlsRBAC at API layer (admin/user roles); group-based model access controls; API key scopingActive
§314.4(d) — Safeguards — encryptionTLS in transit; Fernet application-layer encryption for stored credentials and configsActive
§314.4(d) — Safeguards — NPI transmission preventionBLOCK action prevents NPI transmission through Gateway; detection patterns cover GLBA NPI categoriesActive
§314.4(h) — Monitor, test, respondSIEM integration exports GLBA-relevant enforcement events in OCSF formatActive
§314.4(b) — Qualified individualOrganizational governance; not an Arbitex controlOrganizational
§314.4(i) — Service provider oversightArbitex functions as service provider; contract provisions are organizationalOrganizational
Terminal window
{ "bundle_id": "glba", "enabled": true }

Bundle ID: sox Standard: Sarbanes-Oxley Act — Sections 302 and 404 Scope: Public companies and subsidiaries. Section 404 requires assessment of internal controls over financial reporting (ICFR). AI systems used by finance teams are in scope when processing or generating financial reporting data.

The sox bundle detects financial reporting risk patterns:

  • Internal financial figures in draft reporting context
  • Material nonpublic information (MNPI) indicators
  • Earnings guidance and forecast language
  • Audit communication and financial committee patterns
SOX Control AreaArbitex controlStatus
ICFR — IT general controls: logical accessAPI key auth + RS256 JWT + SAML SSO; RBAC enforced at middleware layerActive
ICFR — IT general controls: audit trailTamper-evident HMAC-chained audit trail; all AI interactions logged with admin ID and timestampActive
ICFR — Change managementAudit log captures all policy chain changes with admin ID, timestamp, and before/after stateActive
ICFR — MonitoringSIEM export of enforcement events; continuous monitoring of AI system behaviorActive
Access controls for financial dataPolicy Engine restricts model access by group; group-based rules vary enforcement by user classificationActive
Whistleblower protectionsOrganizational governance; not an Arbitex controlOrganizational
Terminal window
{ "bundle_id": "sox", "enabled": true }

Bundle ID: bsa_aml Standard: Bank Secrecy Act / Anti-Money Laundering (31 U.S.C. § 5311 et seq.) Scope: Financial institutions, money services businesses, broker-dealers. AI systems used in customer communications or transaction processing are in scope for suspicious activity monitoring.

The bsa_aml bundle detects patterns associated with suspicious activity:

  • Transaction amounts and account identifiers in structured patterns
  • Currency transaction report (CTR) threshold indicators ($10,000+)
  • Structuring language and layering indicators
  • High-risk jurisdiction references
  • Correspondent banking and wire transfer identifiers
BSA/AML RequirementArbitex controlStatus
Suspicious Activity Reporting (31 U.S.C. § 5318(g))Suspicious patterns in AI interactions logged with matched category and rule reference; exported to SIEM for compliance team reviewActive
Customer Identification Program (CIP)Sensitive identification data in prompts triggers BLOCK or PROMPT action; detection patterns cover CIP-relevant identifiersActive
Recordkeeping (31 CFR § 1010.430)Audit trail retains enforcement records; SIEM retention should be configured for BSA minimum retention (5 years)Active
Currency Transaction ReportsCTR threshold indicators trigger PROMPT governance for compliance team reviewActive
Compliance officer designationOrganizational governance; not an Arbitex controlOrganizational
Terminal window
{ "bundle_id": "bsa_aml", "enabled": true }

Bundle ID: ccpa Standard: California Consumer Privacy Act (as amended by CPRA — Cal. Civ. Code § 1798.100 et seq.) Scope: For-profit businesses operating in California meeting revenue or data processing thresholds. AI systems processing California consumer personal information are in scope.

The ccpa bundle detects California consumer personal information categories:

  • Identifiers (name, email, IP address, account number, SSN)
  • Commercial information (purchasing records, financial history)
  • Biometric information
  • Geolocation data (precise location)
  • Professional and employment information
  • Sensitive personal information (SPI) under CPRA: government IDs, financial account credentials, health data, racial/ethnic origin, precise geolocation
CCPA / CPRA ProvisionArbitex controlStatus
§ 1798.100 — Right to Know / Right to DeleteArbitex does not retain prompt/completion content; audit entries log category, not PI contentActive
§ 1798.100(a)(3) — Data minimization (CPRA)Policy Engine enforces purpose limitation; groups with different authorized purposes have separate policy rulesActive
§ 1798.150 — Security obligationEncryption in transit (TLS) and at rest (Azure platform AES-256 + Fernet application layer); audit trail for all PI processingActive
CPRA — Sensitive PI restrictionsBLOCK action prevents unauthorized use or disclosure of CCPA sensitive PI categoriesActive
§ 1798.135 — Opt-out of sale/sharingOrganizational signal; not an Arbitex controlOrganizational
Privacy policy and notice requirementsOrganizational governanceOrganizational
Terminal window
{ "bundle_id": "ccpa", "enabled": true }

Bundle ID: sec_17a4 Standard: SEC Rule 17a-4 (17 CFR § 240.17a-4) — broker-dealer electronic recordkeeping Scope: FINRA-registered broker-dealers. Rule 17a-4(f) imposes strict requirements for electronic records: non-rewritable, non-erasable storage, indexing, and third-party audit access.

The sec_17a4 bundle detects broker-dealer business communication and records patterns:

  • Trade confirmation and order execution patterns
  • Customer account communication markers
  • Research report and recommendation indicators
  • Regulatory correspondence patterns
Rule 17a-4 RequirementArbitex controlStatus
17a-4(f) — Electronic storageAudit trail with HMAC chain; 90-day active + 2-year archive retentionActive
Non-rewritable, non-erasableHMAC chain detects modification; Azure Log Analytics archive tier provides immutable storageActive
Indexing and accessibilityAudit entries are structured JSON with consistent schema; indexable by SIEM using standard field queriesActive
Third-party audit accessSIEM export via OCSF provides the mechanism for designated third-party access to recordsActive
Retention periods (3–6 years)Arbitex retains 2 years; SIEM integration required for full Rule 17a-4 retention periodsActive
Third-party download agentOrganizational requirement; not an Arbitex controlOrganizational
Terminal window
{ "bundle_id": "sec_17a4", "enabled": true }

Organizations with overlapping obligations can activate multiple bundles simultaneously. Each occupies a position in the policy chain.

Terminal window
PUT https://api.arbitex.ai/api/admin/orgs/{org_id}/policy/chain
Authorization: Bearer arb_live_your-api-key
Content-Type: application/json
{
"combining_algorithm": "first_applicable",
"packs": [
{ "pack_id": "bundle_hipaa", "sequence": 1 },
{ "pack_id": "bundle_pci_dss", "sequence": 2 },
{ "pack_id": "bundle_glba", "sequence": 3 },
{ "pack_id": "pack_01HZ_CUSTOM", "sequence": 10 }
]
}

A healthcare finance organization might activate hipaa, pci_dss, and glba simultaneously — all three bundles evaluate before custom organizational packs.


All enforcement events export to SIEM in OCSF v1.1 format. Each Compliance Bundle enforcement action maps to OCSF class 2001 — Security Finding.

Event typeOCSF class
DLP enforcement (bundle match)2001 — Security Finding
Authentication events3002 — Authentication Activity
Administrative changes3001 — Account Change

Filter SIEM dashboards using:

  • class_uid = 2001 — all enforcement events
  • cloud.account.uid = <org_id> — org-specific events
  • metadata.framework_reference — specific regulatory reference (e.g., PCI-DSS Requirement 3.4)

See Audit Data Model Reference for the full field-level OCSF mapping.