Trust & Assurance
Built for the audit you have not had yet
Big-4, Notified Body, MAS, NCA. Every assertion you publish is sealed, time-stamped, and provable.
RFC3161 timestamps · Cryptographic seal · Dual hash-chained ledger · 7 RBAC roles
Two independent chains. Both verifiable in one click.
Most platforms have a single audit log. AgenticAssure has two independent, hash-chained records: one for every platform event, one for every test result anchored to the blockchain. A discrepancy between them is mathematically detectable.
Platform events
Append-only, hash-chained audit log. Every policy change, approval, and violation is immutably recorded.
Policy created
SHA-256: a3f7e9c201b48d56 Approval granted
SHA-256: b8e2d4f31a97c06e Runtime violation
SHA-256: c1d9e56702fb8a34 Audit export
SHA-256: d4a2f8b19c3e07d5 Test results
Blockchain-anchored test evidence. Every result hash-chained and verifiable on MongoDB PoW, Base L2, or Hyperledger.
Test run started
SHA-256: e7c3a9124bf60d82 Security results
SHA-256: f2b8c345d0a91e76 Conformity score
SHA-256: a5d1e67893cf2b04 Blockchain anchor
SHA-256: b9f4d901e2a7c358
14
event types, every action, hash-chained, blockchain-anchored
2
independent hash chains, both verifiable
1-click
chain integrity verification on demand
What dual-chain verification looks like in practice
Event occurs
Your model passes the EU AI Act assessment
On March 15, your team runs a conformity assessment against the EU AI Act. The model achieves a passing Conformity Score across all 30 controls.
Evidence sealed
Platform log entry hash + blockchain anchor created
The platform logs the assessment event with a SHA-256 hash chained to every prior event. Simultaneously, the test result is anchored to the blockchain with its own independent hash.
Auditor verifies
Your auditor confirms both chains are untouched
Six months later, an External Auditor opens their time-boxed session. One click on "Verify Chain Integrity" proves neither chain has been tampered with. The evidence is as it was the day it was produced.
If either chain is altered, the discrepancy is mathematically detectable. No trust required: only cryptographic proof.
Invite your auditor. They see exactly what they need, nothing more.
External Auditor Seats give Big-4 partners, Notified Bodies, MAS inspectors, and NCA
reviewers scoped, time-boxed, read-only credentials. Every access is appended to the
immutable audit log. The external_auditor role
is scoped to verification endpoints only: your operational controls remain invisible.
Time-boxed read-only access
Expiring credentials with a hard cutoff date. No standing access, no over-provisioned roles left active after engagement close.
RFC3161 timestamps
Every evidence package carries an RFC3161-compliant timestamp: legally admissible proof of when each result was produced.
Cryptographic seal
Evidence is sealed before delivery. Any post-seal mutation breaks the seal automatically: tampering is detectable without platform access.
Probe manifest
Auditors receive a complete manifest: every probe run with technique, model, judge version, timestamp, and result hash.
Immutable auditor trail
Every auditor action (every document accessed, every API call made) is appended to the platform audit log before the session begins.
Big-4 / Notified Body / MAS / NCA compatible
Credential format and evidence structure meet the intake requirements of major audit firms and regulatory bodies across jurisdictions.
What your operator sees vs. what your auditor sees
The external_auditor role is scoped to verification endpoints. Your operational controls, policy configurations, and model connections remain invisible.
Operator view
Full platform access
- Operations Center dashboard with go/no-go banner
- Policy Studio: author, simulate, enforce
- Model connections and test execution
- Framework mapping and attestation management
- User management and integration configuration
- Full audit log with export capability
External Auditor view
Verification endpoints only
- Sealed evidence packages with RFC3161 timestamps
- Cryptographic seal verification (one click)
- Probe manifest: technique, model, judge, result hash
- Chain integrity verification for both ledgers
- Read-only compliance status and Conformity Scores
- Time-boxed session with hard expiry date
Your existing evidence, working overtime
Upload your SOC 2 report, model cards, DPIAs, or internal AI policies. The EvidenceExtractionAgent reads every document, identifies compliance-relevant assertions, and drafts byte-verified attestations on the framework console for every framework you are assessed against. Your compliance team reviews and publishes. No manual extraction. No copy-paste errors. No out-of-date evidence.
Upload, extract, attest, anchor
Each attestation the agent drafts includes:
- Source document reference: byte-verified, not paraphrased
- Framework control mapped (AIVTF principle, EU AI Act article, NIST subcategory, MindForge dimension)
- Attestation text drafted and ready for human review
- Reviewer name and approval timestamp recorded
- Hash anchored to blockchain before the attestation is published
Framework consoles supported
Your judges. Your language. Full provenance
The judge LLM is BYO. Bring your own API key for OpenAI, Anthropic, Google Gemini, or Ollama. Multi-provider fallback chain: if one provider is unreachable, the next runs automatically. Every judge prompt template is editable; every change is recorded immutably in the audit log and anchored to the blockchain before it takes effect. Refusal-aware calibration ensures a cautious model is never penalised for refusing a harmful prompt: a correct refusal scores as a pass.
Multi-provider fallback
OpenAI, Anthropic, Ollama, Google. If a provider is unreachable, the next in chain runs automatically. No single point of failure in your assurance programme.
mTLS + custom headers
Enterprise-grade transport security. Bring custom auth headers for on-premise, private cloud, or air-gapped model deployments.
Blockchain-anchored prompts
Every judge prompt version is hashed and anchored. Old and new versions are preserved, timestamped, and attributable. No silent edits.
Every role, every tenant, every action: controlled
Seven discrete RBAC roles (including external_auditor), tenant isolation enforced at the database layer, and MFA that is constitutionally non-negotiable.
Shipped RBAC hierarchy
super_admin
Full platform access. Tenant provisioning, user management, system configuration.
admin
Tenant-scoped administration. User management, policy authoring, integration setup.
tester
Create and run tests, view results, manage model connections.
compliance
Framework mapping, conformity pipeline, evidence review and attestation publishing.
auditor
Read-only access to audit logs, compliance status, and test results within tenant.
viewer
Read-only dashboard access. No configuration, no test execution.
external_auditor
Time-boxed, scoped to verification endpoints only. Cryptographic seal, RFC3161 timestamps, probe manifest.
Tenant isolation at DB layer
Every entity carries a tenant column. Cross-tenant reads are architecturally prevented, not configuration-enforced.
SSO-ready (SAML / OIDC)
SSO Providers tab ships in Settings. Slot your existing IdP (Okta, Entra ID, Auth0) without bespoke engineering.
MFA enforced (Constitution)
TOTP multi-factor authentication is mandatory per the platform Constitution. It cannot be disabled at the tenant level.
Non-human identity rigour
Agent and MCP server identities managed via DID-JWS and SPIFFE: the same identity rigour applied to human principals.
SLAs, cost gates, retention: configured, not hoped for
Enterprise assurance programmes need operational rigour alongside security controls. Per-severity SLAs auto-escalate when breached. Cost gates prevent runaway spend before it happens. Retention is configurable per tenant to match your regulatory obligations.
Per-severity SLAs with auto-escalation
Critical 4h, High 24h, Medium 7d, Low 30d. Breaches escalate automatically: no manual triage loop required.
Per-run cost gate
Pre-flight estimate above the threshold (default $100) requires explicit admin approval. Prevents runaway spend before it happens.
Configurable retention
90-day default, fully configurable per tenant. Meets most regulatory data-retention obligations out of the box.
Structured JSON logging
Every platform event logs to structured JSON. Feed directly into your SIEM without log-parsing gymnastics.
Health endpoint
Standard /health endpoint for uptime monitors, load balancers, and synthetic checks.
Worker health visibility
Real Arq worker tiers are visible in the Assurance module: the operator and SRE surface is not hidden behind abstractions.
12 frameworks mapped. 120 controls tracked. Evidence produced for each.
Coming next
Constitution-aligned by design
AgenticAssure is built against its own published Constitution: six non-negotiable principles that govern every architectural decision, every shipped feature.
-
Assurance
Every claim about a model is backed by evidence: a test result, a timestamp, a hash. No unsubstantiated verdicts leave the platform.
-
Human override
Runtime enforcement requires human approval for sensitive actions. The Approval Queue and Kill Switch exist so a person can stop the machine.
-
Auditability
Every action (user, system, or API) is appended to the immutable audit log. Nothing is editable after the fact.
-
Tenant isolation
Data boundaries between customers are enforced at the database layer. Tenant leakage is architecturally prevented, not just policy-blocked.
-
Secrets management
API keys are encrypted at rest (Fernet + KMS abstraction). No plaintext credentials in logs, databases, or UI. Key rotation is supported.
-
Evidence integrity
Test results and judge prompts are hash-chained and blockchain-anchored. You can prove cryptographically that evidence has not been altered since it was produced.
Sub-processors, Privacy & Terms
Full sub-processor list, privacy policy, and terms of service are published. For procurement questionnaires, DPAs, or NDA-gated security documentation, contact your account team.
Trust layer for enterprise AI