Esc

    Compliance

    How InferaDB maps to common regulatory and compliance frameworks.

    Overview

    InferaDB’s built-in controls map directly to major compliance frameworks.

    Framework Mapping

    SOC 2

    Control Requirement InferaDB Implementation
    CC6.1 Logical access security Vault-scoped tokens, Ed25519 JWT authentication, RBAC/ReBAC policies
    CC7.2 System monitoring Hash-chained audit trail, Prometheus metrics, OpenTelemetry tracing

    HIPAA

    Section Requirement InferaDB Implementation
    §164.312(a) Access control Fine-grained ReBAC/RBAC/ABAC, vault-scoped tenant isolation
    §164.312(b) Audit controls Every authorization decision logged with full context and crypto signature

    GDPR

    Article Requirement InferaDB Implementation
    Art. 25 Data protection by design Per-tenant encryption, vault isolation, least-privilege tokens
    Art. 30 Records of processing activities Immutable audit trail with decision parameters, policy version, timestamps

    PCI DSS

    Requirement Description InferaDB Implementation
    Req 7 Restrict access by need-to-know Relationship-based access control, vault-scoped permissions
    Req 10 Track access to resources Hash-chained audit log, cryptographic signatures on every entry

    NIS2

    Requirement Description InferaDB Implementation
    Access controls Risk-appropriate access management Fine-grained authorization policies (ReBAC/RBAC/ABAC)
    Zero-trust Assume breach posture mTLS between services, per-request authentication, vault isolation

    DORA

    Requirement Description InferaDB Implementation
    Access policies ICT access control policies IPL-defined authorization policies, vault-scoped tokens
    Continuous monitoring Ongoing risk monitoring Prometheus metrics, audit log streaming, OpenTelemetry tracing

    EU AI Act

    Requirement Description InferaDB Implementation
    Human oversight Ability to review AI decisions Decision simulator, expansion traces, audit explorer
    Logging Record-keeping for AI systems Every evaluation logged with input parameters, result, and explanation path

    Audit Trail

    Every authorization decision produces an audit entry:

    Field Description
    Request params Subject, relation, resource, context
    Result ALLOW or DENY
    Explanation path Full relation traversal that produced the result
    Policy version IPL schema version used for evaluation
    Revision token Data revision at time of evaluation
    Timestamp Decision timestamp
    Crypto signature Ed25519 signature over the entry

    Integrity Properties

    • Append-only — Entries cannot be modified or deleted
    • Hash-chained — Each entry includes the previous entry’s hash, forming a tamper-evident chain
    • Anchored — Committed to the Ledger’s per-vault blockchain

    Cryptographic Shredding

    Each vault’s data is encrypted with a vault-specific key. Deleting the key renders all vault data unrecoverable (GDPR Article 17).

    Data Residency

    Vaults are pinned to a region via the Ledger’s region-based Raft groups:

    # Create a vault pinned to EU region
    inferadb vaults create --name "eu-customers" --region eu-west-1
    

    Data for a region-pinned vault never leaves that region’s Ledger nodes.

    See Ledger Architecture for details on multi-region Raft groups.