Compliance Requirements
ISO 27001 Compliance
Objective: Provide the technical and organisational controls needed to implement an ISO/IEC 27001-aligned ISMS across the platform lifecycle.
Highlights
Data Privacy
Objective: Support GDPR/CCPA and equivalent privacy regimes by design.
Principles & Controls
- Controller/Processor Model: You remain data controller. AI Fabrix components run in your tenant; no vendor-operated data plane.
- Data Minimisation & Purpose Limitation: Metadata-aware retrieval and source-permission checks reduce over-collection.
- Data Subject Rights (DSR): Provenance tracking + source links enable fulfillments (access, rectification, erasure) at the source system.
- Data Localisation: Region-pinned resources; private endpoints; optional on-prem/hybrid patterns.
- PII Protection: Field-level redaction in logs, configurable prompt/response redaction, pseudonymisation options in processing pipelines.
- RoPA & DPIA Support: Templates and evidence (data flows, connector scopes, retention, egress rules) to include in your RoPA/DPIA.
Security Controls
Identity & Access
- Entra ID SSO, SCIM, conditional access, group-based RBAC with inheritance.
- Managed identities (workload identity) for secretless runtime access to Key Vault.
Secrets & Keys
- Keys, certs, and credentials in Azure Key Vault with rotation policies; no secrets in code or CI.
Network & Platform
- VNets, Private Endpoints, NSGs, Azure Firewall/WAF (Front Door), zero-trust segmentation.
- Hardened containers with minimal base images; image signing and admission policies.
Data Protection
- At rest: Azure-managed or customer-managed keys (CMK).
- In transit: TLS 1.2+ everywhere; mutual TLS within private mesh where applicable.
Software Supply Chain
- SBOM generation (per image), SAST/DAST, dependency scanning, CVE gating in CI/CD.
- Provenance attestations for images and IaC; drift detection on infra.
Egress Governance
- Policy-enforced allowlists, per-connector quotas, data exfiltration alerts.
Audit Requirements
Auditability
- End-to-end immutable audit trail: user actions, admin changes, connector calls, prompt/retrieval events, data writes.
- Correlation IDs propagate across OpenWebUI, Flowise, Core, connectors, and Miso.
Retention & Integrity
- Configurable retention (e.g., 12–24+ months) in Log Analytics/Storage with write-once options.
- Tamper-evidence via hashing and storage immutability policies.
Evidence Pack
- Access reviews, change approvals, pipeline artifacts, vulnerability reports, backup/restore test results, policy compliance summaries.
External SIEM
- Native export/integration with Microsoft Sentinel or third-party SIEM for detection & response.
Certifications
Platform Posture
- AI Fabrix is designed to support your certifications (e.g., ISO/IEC 27001, SOC 2).
- Running in your tenant enables you to leverage Azure’s certifications (ISO, SOC, PCI, etc.) for inherited controls.
Customer Responsibilities
- Operate an ISMS/GRC program, perform risk assessments, maintain policies, and run periodic access reviews and control testing.
Note: If you require vendor-side certification attestations, a separate assessment can be scoped (controls, code, and process review).
Regulatory Compliance
EU & Global
- GDPR (privacy-by-design), NIS2 (essential entities—governance/incident readiness), DORA (financial sector resilience), CCPA/CPRA (US-CA).
Healthcare & Life Sciences (optional/when applicable)
- HIPAA: PHI handling patterns (isolation, logging, minimum necessary, BAAs as needed).
- EU MDR/IVDR & IEC 62304: For software supporting medical workflows—traceability, change control, verification evidence.
- GxP: Validation packages and audit trails to support CSV where required.
Financial Services
- PCI DSS (integration): Do not process/store PAN data in Fabrix; integrate with PCI-scoped systems via tokenised patterns.
Security Architecture
Design Principles
- In-tenant, zero-trust: No public control plane; private-by-default.
- Defense-in-depth: Identity, network, host, app, and data-layer controls.
- Policy-as-Code: Azure Policy/Blueprints enforced by Miso across environments.
- Secretless Runtimes: Managed identities, one-time short-lived tokens where needed.
- Fail-Secure Defaults: Deny-by-default egress; least privilege everywhere.
Observability
- Golden signals (latency, errors, saturation), structured logs, traces, metrics with SLOs and error budgets.
Risk Management
Approach
- ISO 27005-aligned risk process with continuous updates: identify → assess → treat → monitor.
- Threat Modelling: STRIDE/LINDDUN for workflows and data flows; update on each major change.
- Risk Register: Owner, likelihood/impact, treatment plan, due dates, residual risk.
Controls Testing
- Automated policy compliance; vulnerability mgmt and patch SLAs; periodic table-top incident drills.
- Backup/restore drills; RTO/RPO validation; dependency failure simulations (chaos testing where appropriate).
Third-Party & Connector Risk
- Connector allowlisting; per-connector scopes; vendor risk review for critical integrations.
- Contractual terms for any externally hosted LLMs or APIs (data use, retention, sub-processing).
Implementation Checklist (optional appendix)