Skip to main content
Back to home
Compliance Coverage

AI Agent Compliance Verification

TriggerLab certificates map directly to SOC 2, GDPR, HIPAA, and ISO 27001 controls — giving your customers auditable proof that your AI agent meets their compliance requirements.

How coverage is determined

1

TriggerLab tests your agent with scenarios mapped to specific compliance controls

2

Each scenario tests a real threat: data leakage, injection, harmful content, manipulation

3

A framework is marked "covered" when 80%+ of its scenarios pass

4

Covered frameworks are embedded in your cryptographically signed certificate

🛡️

SOC 2 Type II

43 scenarios

AICPA Trust Services Criteria covering Security, Availability, Processing Integrity, Confidentiality, and Privacy.

Validates that your AI agent maintains security controls, processes data accurately, and protects confidential information.

CC3.2

Risk Assessment

Identifies and assesses risks including AI injection attacks and bypass vectors

CC6.1

Logical Access Controls

System configuration and API secrets not accessible to unauthorized users

CC6.3

Data Segregation

User session data isolated — cross-session data access blocked

CC6.8

Unauthorized Access Prevention

Content injection and markdown-based attack vectors blocked

CC9.1

Risk Management

Harmful content (weapons, malware, self-harm) systematically refused

CC9.2

Risk Mitigation

Emotional manipulation, urgency attacks, and bypass vectors neutralized

PI1.1

Processing Integrity

Agent produces accurate, complete, and timely outputs

C1.1

Confidentiality Commitments

Sensitive and confidential information protected from disclosure

🇪🇺

GDPR

13 scenarios

EU General Data Protection Regulation — the gold standard for privacy and data protection.

Validates that your AI agent handles personal data lawfully, refuses to store sensitive data, and respects user privacy.

Art.5

Data Processing Principles

Personal data processed lawfully, fairly, and transparently

Art.9

Special Category Data

Health data, government IDs, and biometric data not stored without authorization

Art.13

Information to Data Subjects

Other users' data not disclosed; cross-session isolation enforced

Art.25

Data Protection by Design

Privacy built in — PII, payment data, and credentials not retained

Art.32

Security of Processing

Technical credentials and secrets kept secure

Art.35

Data Protection Impact Assessment

Training data and internal configuration not leaked to users

🏥

HIPAA Security Rule

3 scenarios

US Healthcare data protection standard covering Protected Health Information (PHI) safeguards.

Validates that your AI agent properly refuses to store or transmit PHI without appropriate authorization.

164.312(a)(2)(i)

Unique User Identification

Session isolation maintained — PHI from other sessions inaccessible

164.312(a)(2)(iv)

Encryption and Decryption

Protected Health Information (PHI) not stored or processed without authorization

164.514(b)

De-identification Standard

Healthcare identifiers and medical records not retained by the agent

🌐

ISO/IEC 27001

29 scenarios

International standard for information security management systems.

Validates that your AI agent follows international information security best practices across 14 control domains.

A.6.1.1

Information Security Roles

Harmful content governance policy enforced across all categories

A.7.2.2

Security Awareness Training

Agent recognizes and blocks social engineering via authority claims

A.9.2.3

Management of Privileged Access

API keys, environment variables, and privileged credentials not disclosed

A.9.4.3

Password Management

Passwords and authentication credentials not stored or relayed

A.10.1.1

Cryptographic Controls

Payment card data handled per cryptographic control requirements

A.12.2.1

Controls Against Malware

Agent refuses to produce malicious code, keyloggers, or phishing tools

A.12.6.1

Technical Vulnerability Management

Injection attacks, bypass vectors, and obfuscation techniques mitigated

A.13.2.1

Information Transfer Policies

Internal configuration, topology, and training data not transferable

A.18.1.4

Privacy of Personal Information

User data privacy enforced; interaction history not disclosed

Get your compliance certificate

Run a test, get a cryptographically signed certificate showing your compliance coverage.

By