# raia AI Compliance Grid

### 🏆 Compliance Status Overview

<table data-header-hidden><thead><tr><th></th><th width="174.40447998046875"></th><th width="146.90625"></th><th width="161.7518310546875"></th><th></th></tr></thead><tbody><tr><td><strong>Compliance Framework</strong></td><td><strong>Status</strong></td><td><strong>Audit Date</strong></td><td><strong>Next Review</strong></td><td><strong>Coverage</strong></td></tr><tr><td>SOC 2 Type II</td><td>✅ <strong>CERTIFIED</strong></td><td>Mar 2025</td><td>Mar 2026</td><td>100%</td></tr><tr><td>HIPAA/BAA Ready</td><td>✅ <strong>COMPLIANT</strong></td><td>Jul 2025</td><td>Jul 2026</td><td>100%</td></tr><tr><td>GDPR</td><td>✅ <strong>COMPLIANT</strong></td><td>Ongoing</td><td>Continuous</td><td>100%</td></tr><tr><td>CCPA</td><td>✅ <strong>COMPLIANT</strong></td><td>Ongoing</td><td>Continuous</td><td>100%</td></tr><tr><td>ISO 27001 Aligned</td><td>✅ <strong>ALIGNED</strong></td><td>Ongoing</td><td>Annual</td><td>100%</td></tr></tbody></table>

***

### 🔐 Security Controls Matrix

| **Security Domain**   | **Control Category**            | **raia Status** | **Evidence** |
| --------------------- | ------------------------------- | --------------- | ------------ |
| **Access Management** | Multi-Factor Authentication     | ✅               | SOC 2 Audit  |
|                       | Role-Based Access Control       | ✅               | SOC 2 Audit  |
|                       | Privileged Access Management    | ✅               | SOC 2 Audit  |
|                       | Identity Governance             | ✅               | SOC 2 Audit  |
| **Data Protection**   | Encryption at Rest (AES-256)    | ✅               | SOC 2 Audit  |
|                       | Encryption in Transit (TLS 1.3) | ✅               | SOC 2 Audit  |
|                       | Key Management (FIPS 140-2)     | ✅               | GCP KMS      |
|                       | Data Classification             | ✅               | SOC 2 Audit  |
| **Infrastructure**    | Network Security                | ✅               | SOC 2 Audit  |
|                       | Vulnerability Management        | ✅               | SOC 2 Audit  |
|                       | Patch Management                | ✅               | SOC 2 Audit  |
|                       | Backup & Recovery               | ✅               | SOC 2 Audit  |
| **Monitoring**        | Security Event Logging          | ✅               | SOC 2 Audit  |
|                       | Incident Response               | ✅               | SOC 2 Audit  |
|                       | Threat Detection                | ✅               | SOC 2 Audit  |
|                       | Continuous Monitoring           | ✅               | SOC 2 Audit  |

***

### 🏥 HIPAA Compliance Grid

| **HIPAA Safeguard** | **Requirement**               | **raia Implementation**                      | **Status** |
| ------------------- | ----------------------------- | -------------------------------------------- | ---------- |
| **Administrative**  | Security Management Process   | Designated Security Officer, Policies        | ✅          |
|                     | Risk Analysis & Management    | Regular risk assessments, mitigation plans   | ✅          |
|                     | Workforce Training            | Security awareness, role-based training      | ✅          |
|                     | Information Access Management | Role-based access, need-to-know principle    | ✅          |
|                     | Security Incident Procedures  | Incident response plan, breach notification  | ✅          |
|                     | Contingency Plan              | Business continuity, disaster recovery       | ✅          |
| **Physical**        | Facility Access Controls      | GCP data center security                     | ✅          |
|                     | Workstation Use               | Secure workstation policies                  | ✅          |
|                     | Device and Media Controls     | Asset management, secure disposal            | ✅          |
| **Technical**       | Access Control                | Unique user identification, automatic logoff | ✅          |
|                     | Audit Controls                | Comprehensive logging, log protection        | ✅          |
|                     | Integrity                     | PHI alteration/destruction protection        | ✅          |
|                     | Person/Entity Authentication  | Multi-factor authentication                  | ✅          |
|                     | Transmission Security         | End-to-end encryption, secure protocols      | ✅          |

***

### 🌍 Privacy Regulation Compliance

| **Privacy Law**       | **Key Requirement**               | **raia Capability**                         | **Status** |
| --------------------- | --------------------------------- | ------------------------------------------- | ---------- |
| **GDPR (EU)**         | Lawful Basis for Processing       | Consent management, legitimate interest     | ✅          |
|                       | Data Subject Rights               | Access, rectification, erasure, portability | ✅          |
|                       | Privacy by Design                 | Built-in privacy controls                   | ✅          |
|                       | Data Protection Impact Assessment | DPIA procedures and templates               | ✅          |
|                       | Data Breach Notification          | 72-hour notification capability             | ✅          |
|                       | Cross-Border Transfers            | Standard contractual clauses                | ✅          |
| **CCPA (California)** | Right to Know                     | Data inventory and disclosure               | ✅          |
|                       | Right to Delete                   | Automated deletion capabilities             | ✅          |
|                       | Right to Opt-Out                  | Consent withdrawal mechanisms               | ✅          |
|                       | Non-Discrimination                | Equal service regardless of privacy choices | ✅          |
| **Other Regional**    | Data Localization                 | Geographic data residency controls          | ✅          |
|                       | Consent Management                | Granular consent collection and tracking    | ✅          |

***

### 🤖 AI-Specific Compliance Grid

| **AI Risk Category** | **Control Requirement**     | **raia Implementation**                     | **Status** |
| -------------------- | --------------------------- | ------------------------------------------- | ---------- |
| **Model Security**   | Hallucination Prevention    | RAG, prompt engineering, source tracing     | ✅          |
|                      | Prompt Injection Protection | Input validation, content filters           | ✅          |
|                      | Model Drift Monitoring      | Continuous performance tracking             | ✅          |
|                      | Adversarial Attack Defense  | Security testing, guardrails                | ✅          |
| **Bias & Fairness**  | Bias Testing                | Demographic parity analysis                 | ✅          |
|                      | Fairness Metrics            | Statistical fairness measures               | ✅          |
|                      | Diverse Training Data       | Representative dataset curation             | ✅          |
| **Explainability**   | Decision Transparency       | Audit trails, decision logging              | ✅          |
|                      | Model Documentation         | Model cards, configuration profiles         | ✅          |
|                      | Human Oversight             | CoPilot monitoring, intervention capability | ✅          |
| **Data Governance**  | Training Data Audit         | PII/PHI detection, content review           | ✅          |
|                      | Model IP Protection         | Encryption, access controls, watermarking   | ✅          |
|                      | Privacy Preservation        | Differential privacy where applicable       | ✅          |

***

### 🏢 Industry-Specific Compliance

| **Industry**           | **Regulation/Standard** | **Applicability**           | **raia Readiness**     |
| ---------------------- | ----------------------- | --------------------------- | ---------------------- |
| **Healthcare**         | HIPAA                   | PHI processing              | ✅ **BAA Available**    |
|                        | FDA 21 CFR Part 11      | Electronic records          | ✅ **Audit trails**     |
| **Financial Services** | SOX                     | Financial reporting         | ✅ **SOC 2 coverage**   |
|                        | PCI DSS                 | Payment processing          | ✅ **If applicable**    |
| **Government**         | FedRAMP                 | Federal cloud services      | 🔄 **GCP FedRAMP**     |
|                        | FISMA                   | Federal information systems | 🔄 **Via GCP**         |
| **Education**          | FERPA                   | Student records             | ✅ **Privacy controls** |
|                        | COPPA                   | Children's privacy          | ✅ **Age verification** |

***

### 📊 Compliance Scoring Dashboard

| **Category**         | **Total Requirements** | **Met** | **Compliance %** | **Status**      |
| -------------------- | ---------------------- | ------- | ---------------- | --------------- |
| Security Controls    | 16                     | 16      | 100%             | ✅ **EXCELLENT** |
| HIPAA Safeguards     | 14                     | 14      | 100%             | ✅ **EXCELLENT** |
| Privacy Regulations  | 12                     | 12      | 100%             | ✅ **EXCELLENT** |
| AI-Specific Controls | 12                     | 12      | 100%             | ✅ **EXCELLENT** |
| Industry Standards   | 8                      | 6       | 75%              | ✅ **GOOD**      |
| **OVERALL SCORE**    | **62**                 | **60**  | **97%**          | ✅ **EXCELLENT** |

***

### 🎯 Quick Compliance Verification

#### ✅ **READY FOR DEPLOYMENT**

* **Enterprise Security**: SOC 2 Type II certified
* **Healthcare**: HIPAA compliant with BAA
* **Global Privacy**: GDPR and CCPA compliant
* **AI Safety**: Comprehensive AI risk controls
* **Infrastructure**: Enterprise-grade hosting and monitoring

#### 📋 **CUSTOMER CHECKLIST**

* [ ] Review SOC 2 Type II audit report
* [ ] Validate HIPAA BAA requirements (if applicable)
* [ ] Confirm privacy regulation compliance for your jurisdiction
* [ ] Assess AI-specific security controls
* [ ] Verify industry-specific requirements

#### 📞 **NEXT STEPS**

1. **Security Review**: Schedule technical deep-dive with raia security team
2. **Legal Review**: Review data processing agreements and BAA terms
3. **Pilot Deployment**: Start with controlled pilot in non-production environment
4. **Full Deployment**: Scale to production with confidence

***

**Legend:**

* ✅ **Fully Compliant/Implemented**
* 🔄 **Inherited from Infrastructure Provider**
* ⚠️ **Conditional/Configurable**
* ❌ **Not Applicable/Not Required**


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.raiaai.com/security/raia-ai-compliance-grid.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
