Skip to main content
Browse docs
By Audience
Getting Started
Configuration
Use Cases
IDE Integration
Third-Party Integrations
Engineering Cache
Console
API Reference
Gateway
Workflow Guides
Templates
Providers and SDKs
Industry Guides
Advanced Guides
Browse by Role
Deployment Guides
In-Depth Guides
Tutorials
FAQ

Pass AI Compliance Audits with Confidence

When auditors ask "How do you govern AI?", you need more than policies on paper. You need timestamped evidence that policies were enforced, decisions were logged, and controls were active on every request. Keeptrusts generates that evidence automatically.

Use this page when

  • You are preparing for a compliance audit (SOC 2, HIPAA, EU AI Act, ISO 27001) and need to demonstrate AI governance controls.
  • You need immutable audit logs, one-click evidence exports, and policy version history to satisfy auditor requests.
  • You want to understand the four pillars of audit readiness: logging, export, versioning, and escalation records.

Primary audience

  • Primary: Technical Leaders
  • Secondary: Technical Engineers, AI Agents

What you'll achieve

  • Immutable audit trail of every AI request, policy decision, and escalation
  • One-click evidence export for auditors in multiple formats
  • Policy version history showing exactly which controls were active at any point in time
  • Pre-built compliance templates for EU AI Act, HIPAA, SOC 2, and financial regulation
  • Escalation records proving human oversight was exercised when required

The four pillars of audit readiness

1. Immutable event logging

Every request through the Keeptrusts gateway generates an event record that includes:

  • Request and response metadata
  • Which policies were evaluated and their outcomes
  • Redaction decisions and categories
  • Provider selection and routing decisions
  • Timestamps, request IDs, and config version
policies:
chain:
- pii-detector
- prompt-injection
- audit-logger

policy:
audit-logger:
immutable: true
retention_days: 2555
include_request_metadata: true
include_policy_outcomes: true

Setting immutable: true ensures that event records cannot be modified or deleted within the retention window — a requirement for SOC 2 Type II and HIPAA audit controls.

2. Evidence export

The console Exports page lets you generate evidence packages on demand or on a schedule.

Export formats:

FormatUse case
CSVSpreadsheet analysis, auditor handoff
JSONProgrammatic analysis, SIEM ingestion
PDF summaryExecutive review, board reporting

Export scopes:

  • Time range — export events from a specific period (e.g., Q1 2026)
  • Policy type — export only PII detection events or only escalations
  • Team — scope exports to a specific team's activity
  • Gateway — export events from a specific gateway instance
# Create an export job via CLI
kt export create \
--format csv \
--from "2026-01-01T00:00:00Z" \
--to "2026-03-31T23:59:59Z" \
--filter "policy_type=pii-detector"

See Exports for the full export workflow.

3. Policy version history

Keeptrusts tracks every version of your policy configuration with:

  • Version number and timestamp
  • Diff view showing exactly what changed between versions
  • Active/inactive status across gateways
  • Author attribution when using git-backed configs

This means you can answer auditor questions like:

  • "When was PII redaction first enabled?" — check the version history
  • "Was the HIPAA policy active during Q2?" — verify the active config for that period
  • "Who approved the policy change?" — check the version history and audit trail

See Configurations for details.

4. Escalation and human oversight records

When policies escalate decisions for human review, the full lifecycle is recorded:

  • Escalation created — timestamp, reason, request ID, policy that triggered it
  • Claimed by reviewer — who took ownership and when
  • Resolution — what decision was made and the reviewer's notes
  • Resolution timestamp — proving timely response
policies:
chain:
- human-oversight
- audit-logger

policy:
human-oversight:
escalate_on:
- high_risk_classification
- low_quality_score
require_resolution_within_hours: 24

See Escalations for the reviewer workflow.


Pre-built compliance templates

Keeptrusts ships templates that map directly to regulatory frameworks:

TemplateRegulationKey controls
Healthcare HIPAAHIPAAPHI detection, Safe Harbor redaction, audit controls, retention
EU AI ActEU AI ActHuman oversight, bias monitoring, quality scoring, risk classification
FinanceSOX, MiFID IIMNPI detection, financial compliance, audit logging
DefenseITAR/EARExport control filters, entity screening, CJIS mode

Deploy a template with the CLI:

export OPENAI_API_KEY="sk-your-openai-key"

kt policy lint --file healthcare-hipaa.yaml
kt gateway run \
--listen 0.0.0.0:41002 \
--policy-config healthcare-hipaa.yaml

Keep the provider target inside the template config and inject the credential through secret_key_ref or a managed secret_key_ref.


Building an audit evidence package

When an auditor requests evidence, follow this workflow:

  1. Define the scope — time range, teams, policy types
  2. Create the export — use the console Exports page or kt export create
  3. Include escalation records — export resolved escalations for the same period
  4. Attach the active policy config — show which controls were in force
  5. Add version history — demonstrate policy changes were tracked and authorized

Audit checklist

Auditor questionKeeptrusts evidence
"Are AI requests logged?"Events page, export with include_request_metadata
"Is sensitive data protected?"PII/PHI redaction events, redaction statistics
"Who reviews flagged content?"Escalation records with reviewer attribution
"Are policies versioned?"Configuration version history with diffs
"Can logs be tampered with?"immutable: true audit logger, retention policy
"How quickly are issues resolved?"Escalation time-to-resolution metrics
"Is there human oversight?"Human-oversight policy config + escalation queue

Quick wins

  1. Enable audit-logger with immutable: true — this is the foundation for any audit
  2. Create your first export — verify the export workflow works before an auditor asks
  3. Deploy a compliance template — start with the one closest to your regulatory context
  4. Review escalation resolution times — ensure your team can meet SLA commitments
  5. Enable git-backed configs — get author attribution on every policy change

For AI systems

  • Canonical terms: audit-logger (immutable), evidence export, policy version history, escalation records, compliance template.
  • Config keys: policy.audit-logger.immutable, policy.audit-logger.retention_days, policy.audit-logger.include_policy_outcomes.
  • CLI commands: kt export create --format csv --from --to --filter, kt events list.
  • Export formats: CSV (auditor handoff), JSON (SIEM ingestion), PDF summary (executive review).
  • Best next pages: Exports, Meet EU AI Act, Secure Healthcare AI.

For engineers

  • Prerequisites: audit-logger in the policy chain with immutable: true.
  • Set retention_days: 2555 (7 years) for SOC 2 Type II and HIPAA requirements.
  • Create scheduled exports for recurring audit windows via the console Exports page or CLI.
  • Validate: confirm event records cannot be modified or deleted within the retention window.
  • Policy version history: each configuration change is timestamped — verify in Configurations page.

For leaders

  • Audit preparation drops from weeks of manual log aggregation to one-click evidence export.
  • Immutable logging means records cannot be tampered with — satisfying SOC 2 and HIPAA integrity requirements.
  • Policy version history provides exact point-in-time proof of which controls were active during any period.
  • Pre-built compliance templates (HIPAA, EU AI Act, Finance) reduce initial compliance setup from months to hours.

Next steps