Compliance Frameworks
AIPTx maps security findings to major compliance frameworks, helping you demonstrate security posture for audits and certifications.Supported Frameworks
SOC 2
Service Organization Control 2 - Trust Service Criteria
ISO 27001
International information security standard
PCI DSS
Payment Card Industry Data Security Standard
HIPAA
Health Insurance Portability and Accountability Act
GDPR
General Data Protection Regulation
NIST
National Institute of Standards and Technology
SOC 2 Mapping
Trust Service Criteria Coverage
| Criteria | Category | AIPTx Coverage |
|---|---|---|
| CC6.1 | Security | Access control testing |
| CC6.2 | Security | Authentication testing |
| CC6.3 | Security | Authorization testing |
| CC6.6 | Security | Encryption validation |
| CC6.7 | Security | Vulnerability management |
| CC7.1 | Security | Configuration analysis |
| CC7.2 | Security | Change management |
Example Report Section
PCI DSS Mapping
Requirements Coverage
| Requirement | Description | AIPTx Tests |
|---|---|---|
| 6.5.1 | Injection flaws | SQL, NoSQL, Command injection |
| 6.5.2 | Buffer overflows | Memory safety testing |
| 6.5.3 | Insecure crypto | Encryption analysis |
| 6.5.4 | Insecure communications | TLS/SSL validation |
| 6.5.5 | Improper error handling | Error message analysis |
| 6.5.6 | Vulnerability identification | CVE scanning |
| 6.5.7 | XSS vulnerabilities | Cross-site scripting tests |
| 6.5.8 | Access control | Authorization testing |
| 6.5.9 | CSRF vulnerabilities | CSRF protection analysis |
| 6.5.10 | Authentication flaws | Auth mechanism testing |
Compliance Report
ISO 27001 Mapping
Annex A Controls
| Control | Description | Assessment |
|---|---|---|
| A.9.1 | Access control policy | ✅ Compliant |
| A.9.2 | User access management | ⚠️ Gaps found |
| A.9.4 | System access control | ❌ Non-compliant |
| A.10.1 | Cryptographic controls | ✅ Compliant |
| A.12.6 | Vulnerability management | ✅ Compliant |
| A.14.1 | Security requirements | ⚠️ Gaps found |
| A.14.2 | Security in development | ⚠️ Gaps found |
HIPAA Mapping
Security Rule Requirements
| Specification | Type | AIPTx Assessment |
|---|---|---|
| Access Control | Required | Authorization testing |
| Audit Controls | Required | Logging analysis |
| Integrity | Required | Data protection testing |
| Authentication | Required | Auth mechanism review |
| Transmission Security | Required | Encryption validation |
PHI Protection Assessment
GDPR Mapping
Article Requirements
| Article | Requirement | AIPTx Testing |
|---|---|---|
| Art. 25 | Data protection by design | Security architecture review |
| Art. 32 | Security of processing | Vulnerability assessment |
| Art. 33 | Breach notification | Incident response capability |
| Art. 35 | Impact assessment | Risk analysis |
Data Protection Assessment
NIST Cybersecurity Framework
Function Mapping
| Function | Category | AIPTx Coverage |
|---|---|---|
| Identify | Asset Management | Discovery and enumeration |
| Protect | Access Control | Authorization testing |
| Protect | Data Security | Encryption validation |
| Detect | Security Monitoring | Vulnerability detection |
| Respond | Analysis | Finding prioritization |
Generating Compliance Reports
Single Framework
Multiple Frameworks
Configuration File
Audit Evidence
Evidence Package
AIPTx can generate an evidence package for auditors:- Scan configuration and scope
- Complete findings with timestamps
- Proof of concept evidence
- Remediation tracking
- Historical trend data