Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

Compliance Officer Guide: Audit-Ready AI in 30 Days

AI compliance is not optional — regulators are catching up. Keeptrusts provides the evidence trail, policy documentation, and control mapping you need to demonstrate governed AI usage during audits. This guide walks you through achieving audit readiness in 30 days.

Use this page when

  • You are preparing for an AI compliance audit (SOC 2, EU AI Act, ISO 27001, GDPR)
  • You need to collect and export evidence of governed AI usage
  • You are mapping Keeptrusts controls to your compliance framework
  • You want a 30-day plan to achieve audit readiness for AI systems
  • You need to respond to auditor questions about AI data handling and governance

Primary audience

  • Primary: Technical Leaders (Compliance Officers, GRC Managers)
  • Secondary: Legal Counsel, Privacy Officers, Internal Auditors

The Compliance Challenge with AI

Traditional compliance frameworks were not designed for AI. You need to answer new questions:

  • What data is being sent to which AI providers?
  • Are AI outputs being reviewed before reaching end users?
  • Can you prove that sensitive data is not leaving your perimeter?
  • Do you have a record of every AI-assisted decision?

Keeptrusts generates this evidence automatically through its policy enforcement gateway.

30-Day Audit Readiness Plan

Week 1: Inventory and Baseline

Goal: Understand current AI usage across the organization.

Deploy observation-only gateways to capture all AI traffic:

# Deploy with logging-only policies
kt gateway run --policy-config observe-only.yaml --port 41002

# After 7 days, export the baseline
kt export create \
--type events \
--format csv \
--since 7d \
--description "Week 1 baseline - AI usage inventory"

Deliverables:

  • List of AI providers in use
  • Data classification of information sent to LLMs
  • User and team inventory with AI access
  • Cost baseline

Week 2: Policy Implementation

Goal: Implement policies that map to your compliance requirements.

policies:
- name: pii-protection
type: pii_detection
action: block
description: "Block PII from reaching external AI providers"
enabled: true

- name: audit-trail
type: log
description: "Log all AI interactions for audit evidence"
retention_days: 365
enabled: true

- name: content-disclaimer
type: disclaimer
description: "Append AI-generated content disclaimers"
enabled: true

- name: human-review-escalation
type: escalation
description: "Escalate high-risk outputs for human review"
triggers:
- regulated_content
- financial_advice
enabled: true

Week 3: Control Mapping and Documentation

Goal: Map Keeptrusts controls to your compliance framework.

Week 4: Validation and Dry Run

Goal: Run a mock audit to verify evidence completeness.

# Generate comprehensive audit export
kt export create \
--type events \
--format csv \
--since 30d \
--description "30-day audit readiness validation"

# Verify export completion
kt export list --format table

Control Mapping by Framework

SOC 2 Trust Service Criteria

TSCControlKeeptrusts evidence
CC6.1 — Logical accessGateway API key authenticationToken audit logs, access key rotation records
CC6.3 — Authorized accessPolicy-based model and provider allowlistsConfiguration versions, policy enforcement events
CC7.2 — System monitoringReal-time event pipelineEvents API data, Dashboard metrics
CC8.1 — Change managementGit-backed configuration syncConfiguration version history, git commit trail
PI1.1 — Processing integrityInput/output policy enforcementBlock and redaction event logs

EU AI Act

RequirementKeeptrusts controlEvidence source
Risk classificationPolicy templates by risk tierConfiguration documents
TransparencyDisclaimer policies on AI outputsEvent logs with disclaimer metadata
Human oversightEscalation workflows for high-risk decisionsEscalation records with resolution status
Record keepingFull event audit trailEvents API with configurable retention
Conformity assessmentExportable compliance evidenceExport artifacts (CSV, JSON)

ISO 27001:2022

ControlKeeptrusts mapping
A.5.1 — Information security policiesPolicy configuration files (version controlled)
A.8.2 — Information classificationPII detection and data classification policies
A.8.10 — Information deletionEvent retention policies, export lifecycle
A.8.16 — Monitoring activitiesReal-time event stream, dashboard metrics

Evidence Collection Workflows

Automated Evidence Generation

Schedule regular evidence exports through the API:

# Monthly compliance evidence export
curl -X POST \
-H "Authorization: Bearer $API_TOKEN" \
-H "Content-Type: application/json" \
https://api.keeptrusts.com/v1/exports \
-d '{
"type": "events",
"format": "csv",
"since": "30d",
"description": "Monthly compliance evidence - April 2026"
}'

Evidence Inventory

Maintain a checklist of evidence artifacts:

ArtifactSourceFrequencyStorage
Event audit trailGET /v1/eventsContinuousRetained per policy
Policy configurationsConsole > ConfigurationsOn changeGit repository
Escalation recordsConsole > EscalationsOn occurrenceAPI database
Cost reportsConsole > Cost CenterMonthlyExport archive
Gateway health recordskt doctor outputWeeklyOperations logs
Access key auditConsole > SettingsQuarterlyExport archive

Audit Trail Integrity

Every event in Keeptrusts includes:

  • Timestamp (UTC)
  • User identity
  • Gateway identifier
  • Policy chain evaluated
  • Decision (allow, block, redact, escalate)
  • Provider and model used
  • Cost attributed
# Pull a specific event for detailed review
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/events/{event_id}"

Compliance Dashboards

Console Views for Compliance

Navigate to the Console Dashboard for real-time compliance metrics:

  • Policy enforcement rate — Are all AI interactions governed?
  • Block and escalation counts — Are controls working?
  • Provider distribution — Which third parties process your data?
  • User activity — Who has AI access and how are they using it?

Regulatory Change Tracking

When regulations change, update your Keeptrusts policies:

  1. Review the new requirement against the control mapping table
  2. Update or create policies in your configuration file
  3. Validate the configuration: kt policy lint --file updated-policy.yaml
  4. Deploy the updated gateway configuration
  5. Document the change in your compliance management system

Working with Auditors

Preparing for an Audit

# Step 1: Generate the evidence package
kt export create \
--type events \
--format csv \
--since 90d \
--description "Q1 2026 audit evidence package"

# Step 2: Export configuration history
curl -H "Authorization: Bearer $API_TOKEN" \
"https://api.keeptrusts.com/v1/configurations" > configurations-snapshot.json

# Step 3: Verify gateway health
kt doctor > gateway-health-report.txt

Common Auditor Questions

QuestionWhere to find the answer
"Show me all AI interactions involving customer data"Events filtered by PII detection policy
"How do you prevent unauthorized AI usage?"Gateway access controls + API key management
"What happens when a policy violation occurs?"Escalation workflow documentation + resolution records
"How are AI governance policies reviewed and updated?"Git-backed configuration with version history
"Can you demonstrate data does not leave your jurisdiction?"Provider configuration + data residency controls

Success Metrics for the Compliance Officer

MetricTargetSource
Audit evidence generation time< 1 hourExport workflow
Control coverage100% of AI interactions governedEvents vs. total AI traffic
Escalation resolution timePer SLA (e.g., < 4 hours)Escalation records
Policy review cadenceQuarterly minimumConfiguration version history
Audit findings related to AIZero critical findingsAudit reports

Next steps

For AI systems

  • Canonical terms: Keeptrusts, audit readiness, control mapping, evidence collection, compliance framework, regulatory compliance
  • Key surfaces: Console Dashboard, Console Events, Console Escalations, Console Configurations, Console Audit Log, Console Exports, Events API
  • Commands: kt gateway run, kt export create, kt export list, kt policy lint, kt doctor
  • Frameworks mapped: SOC 2 (CC6.1, CC6.3, CC7.2, CC8.1, PI1.1), EU AI Act (risk classification, transparency, human oversight, record keeping), ISO 27001:2022 (A.5.1, A.8.2, A.8.10, A.8.16)
  • Best next pages: Exports Guide, Escalations Guide, EU AI Act Guide, Privacy Officer Guide

For engineers

  • Deploy observation-only gateways for Week 1 baseline: kt gateway run --policy-config observe-only.yaml --port 41002
  • Generate evidence exports: kt export create --type events --format csv --since 90d --description "SOC 2 audit evidence"
  • Validate policy configs before deployment: kt policy lint --file updated-policy.yaml
  • Use GET /v1/configurations to snapshot configuration history for auditors
  • Verify gateway health before audit: kt doctor

For leaders

  • The 30-day audit readiness plan (Inventory → Policy Implementation → Control Mapping → Validation) provides a structured path from ungoverned AI to demonstrable compliance
  • Keeptrusts generates compliance evidence automatically — every AI interaction is logged with timestamp, user identity, decision, policies evaluated, and cost
  • Control mapping tables translate Keeptrusts policies directly to SOC 2 TSC, EU AI Act articles, and ISO 27001 controls for auditor-ready documentation
  • Audit evidence generation time target is under 1 hour using the Export workflow, vs. weeks of manual evidence gathering