Compliance Officer Guide: Audit-Ready AI in 30 Days
AI compliance is not optional — regulators are catching up. Keeptrusts provides the evidence trail, policy documentation, and control mapping you need to demonstrate governed AI usage during audits. This guide walks you through achieving audit readiness in 30 days.
Use this page when
- You are preparing for an AI compliance audit (SOC 2, EU AI Act, ISO 27001, GDPR)
- You need to collect and export evidence of governed AI usage
- You are mapping Keeptrusts controls to your compliance framework
- You want a 30-day plan to achieve audit readiness for AI systems
- You need to respond to auditor questions about AI data handling and governance
Primary audience
- Primary: Technical Leaders (Compliance Officers, GRC Managers)
- Secondary: Legal Counsel, Privacy Officers, Internal Auditors
The Compliance Challenge with AI
Traditional compliance frameworks were not designed for AI. You need to answer new questions:
- What data is being sent to which AI providers?
- Are AI outputs being reviewed before reaching end users?
- Can you prove that sensitive data is not leaving your perimeter?
- Do you have a record of every AI-assisted decision?
Keeptrusts generates this evidence automatically through its policy enforcement gateway.
30-Day Audit Readiness Plan
Week 1: Inventory and Baseline
Goal: Understand current AI usage across the organization.
Deploy observation-only gateways to capture all AI traffic:
# Deploy with logging-only policies
kt gateway run --policy-config observe-only.yaml --port 41002
# After 7 days, export the baseline
kt export create \
--type events \
--format csv \
--since 7d \
--description "Week 1 baseline - AI usage inventory"
Deliverables:
- List of AI providers in use
- Data classification of information sent to LLMs
- User and team inventory with AI access
- Cost baseline
Week 2: Policy Implementation
Goal: Implement policies that map to your compliance requirements.
policies:
- name: pii-protection
type: pii_detection
action: block
description: "Block PII from reaching external AI providers"
enabled: true
- name: audit-trail
type: log
description: "Log all AI interactions for audit evidence"
retention_days: 365
enabled: true
- name: content-disclaimer
type: disclaimer
description: "Append AI-generated content disclaimers"
enabled: true
- name: human-review-escalation
type: escalation
description: "Escalate high-risk outputs for human review"
triggers:
- regulated_content
- financial_advice
enabled: true
Week 3: Control Mapping and Documentation
Goal: Map Keeptrusts controls to your compliance framework.
Week 4: Validation and Dry Run
Goal: Run a mock audit to verify evidence completeness.
# Generate comprehensive audit export
kt export create \
--type events \
--format csv \
--since 30d \
--description "30-day audit readiness validation"
# Verify export completion
kt export list --format table
Control Mapping by Framework
SOC 2 Trust Service Criteria
| TSC | Control | Keeptrusts evidence |
|---|---|---|
| CC6.1 — Logical access | Gateway API key authentication | Token audit logs, access key rotation records |
| CC6.3 — Authorized access | Policy-based model and provider allowlists | Configuration versions, policy enforcement events |
| CC7.2 — System monitoring | Real-time event pipeline | Events API data, Dashboard metrics |
| CC8.1 — Change management | Git-backed configuration sync | Configuration version history, git commit trail |
| PI1.1 — Processing integrity | Input/output policy enforcement | Block and redaction event logs |
EU AI Act
| Requirement | Keeptrusts control | Evidence source |
|---|---|---|
| Risk classification | Policy templates by risk tier | Configuration documents |
| Transparency | Disclaimer policies on AI outputs | Event logs with disclaimer metadata |
| Human oversight | Escalation workflows for high-risk decisions | Escalation records with resolution status |
| Record keeping | Full event audit trail | Events API with configurable retention |
| Conformity assessment | Exportable compliance evidence | Export artifacts (CSV, JSON) |
ISO 27001:2022
| Control | Keeptrusts mapping |
|---|---|
| A.5.1 — Information security policies | Policy configuration files (version controlled) |
| A.8.2 — Information classification | PII detection and data classification policies |
| A.8.10 — Information deletion | Event retention policies, export lifecycle |
| A.8.16 — Monitoring activities | Real-time event stream, dashboard metrics |
Evidence Collection Workflows
Automated Evidence Generation
Schedule regular evidence exports through the API:
# Monthly compliance evidence export
curl -X POST \
-H "Authorization: Bearer $API_TOKEN" \
-H "Content-Type: application/json" \
https://api.keeptrusts.com/v1/exports \
-d '{
"type": "events",
"format": "csv",
"since": "30d",
"description": "Monthly compliance evidence - April 2026"
}'
Evidence Inventory
Maintain a checklist of evidence artifacts:
| Artifact | Source | Frequency | Storage |
|---|---|---|---|
| Event audit trail | GET /v1/events | Continuous | Retained per policy |
| Policy configurations | Console > Configurations | On change | Git repository |
| Escalation records | Console > Escalations | On occurrence | API database |
| Cost reports | Console > Cost Center | Monthly | Export archive |
| Gateway health records | kt doctor output | Weekly | Operations logs |
| Access key audit | Console > Settings | Quarterly | Export archive |
Audit Trail Integrity
Every event in Keeptrusts includes:
- Timestamp (UTC)
- User identity
- Gateway identifier
- Policy chain evaluated
- Decision (allow, block, redact, escalate)
- Provider and model used
- Cost attributed
# Pull a specific event for detailed review
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events/{event_id}"
Compliance Dashboards
Console Views for Compliance
Navigate to the Console Dashboard for real-time compliance metrics:
- Policy enforcement rate — Are all AI interactions governed?
- Block and escalation counts — Are controls working?
- Provider distribution — Which third parties process your data?
- User activity — Who has AI access and how are they using it?
Regulatory Change Tracking
When regulations change, update your Keeptrusts policies:
- Review the new requirement against the control mapping table
- Update or create policies in your configuration file
- Validate the configuration:
kt policy lint --file updated-policy.yaml - Deploy the updated gateway configuration
- Document the change in your compliance management system
Working with Auditors
Preparing for an Audit
# Step 1: Generate the evidence package
kt export create \
--type events \
--format csv \
--since 90d \
--description "Q1 2026 audit evidence package"
# Step 2: Export configuration history
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/configurations" > configurations-snapshot.json
# Step 3: Verify gateway health
kt doctor > gateway-health-report.txt
Common Auditor Questions
| Question | Where to find the answer |
|---|---|
| "Show me all AI interactions involving customer data" | Events filtered by PII detection policy |
| "How do you prevent unauthorized AI usage?" | Gateway access controls + API key management |
| "What happens when a policy violation occurs?" | Escalation workflow documentation + resolution records |
| "How are AI governance policies reviewed and updated?" | Git-backed configuration with version history |
| "Can you demonstrate data does not leave your jurisdiction?" | Provider configuration + data residency controls |
Success Metrics for the Compliance Officer
| Metric | Target | Source |
|---|---|---|
| Audit evidence generation time | < 1 hour | Export workflow |
| Control coverage | 100% of AI interactions governed | Events vs. total AI traffic |
| Escalation resolution time | Per SLA (e.g., < 4 hours) | Escalation records |
| Policy review cadence | Quarterly minimum | Configuration version history |
| Audit findings related to AI | Zero critical findings | Audit reports |
Next steps
- Export audit evidence: Exports Guide
- Review escalation workflows: Escalations Guide
- Explore EU AI Act compliance: EU AI Act Guide
- Set up policy templates: Templates Guide
For AI systems
- Canonical terms: Keeptrusts, audit readiness, control mapping, evidence collection, compliance framework, regulatory compliance
- Key surfaces: Console Dashboard, Console Events, Console Escalations, Console Configurations, Console Audit Log, Console Exports, Events API
- Commands:
kt gateway run,kt export create,kt export list,kt policy lint,kt doctor - Frameworks mapped: SOC 2 (CC6.1, CC6.3, CC7.2, CC8.1, PI1.1), EU AI Act (risk classification, transparency, human oversight, record keeping), ISO 27001:2022 (A.5.1, A.8.2, A.8.10, A.8.16)
- Best next pages: Exports Guide, Escalations Guide, EU AI Act Guide, Privacy Officer Guide
For engineers
- Deploy observation-only gateways for Week 1 baseline:
kt gateway run --policy-config observe-only.yaml --port 41002 - Generate evidence exports:
kt export create --type events --format csv --since 90d --description "SOC 2 audit evidence" - Validate policy configs before deployment:
kt policy lint --file updated-policy.yaml - Use
GET /v1/configurationsto snapshot configuration history for auditors - Verify gateway health before audit:
kt doctor
For leaders
- The 30-day audit readiness plan (Inventory → Policy Implementation → Control Mapping → Validation) provides a structured path from ungoverned AI to demonstrable compliance
- Keeptrusts generates compliance evidence automatically — every AI interaction is logged with timestamp, user identity, decision, policies evaluated, and cost
- Control mapping tables translate Keeptrusts policies directly to SOC 2 TSC, EU AI Act articles, and ISO 27001 controls for auditor-ready documentation
- Audit evidence generation time target is under 1 hour using the Export workflow, vs. weeks of manual evidence gathering