Skip to content

Compliance Dashboard

Compliance Dashboard

The GOVERN Compliance Dashboard gives SOC analysts and compliance officers a real-time view of the organization’s AI governance posture across all active frameworks. This page covers how to read the compliance view, use the evidence chain for audit responses, track policy violations, and configure scheduled reports.


Framework Compliance Status at a Glance

The Compliance Overview panel at the top of the compliance view shows a score card for each active framework.

Reading the Score Card

Each framework tile shows:

ElementDescription
Overall score0–100% — the percentage of mandatory controls currently satisfied
Controls passing / totale.g. “42/47 controls passing”
Critical gapsCount of failing controls with HIGH or CRITICAL severity
Last assessedTimestamp of the most recent assessment contributing to this score
Trend arrowWeek-over-week change: ↑ improving, ↓ declining, → stable
Certification statusFor frameworks with formal certification targets (ISO 42001, FedRAMP)

Supported Frameworks

FrameworkAbbreviationControl Count
NIST SP 800-53 Rev 5800-5320 control families
NIST AI Risk Management FrameworkAI RMF4 functions, 72 subcategories
EU AI ActEU-AIARisk-tier based
ISO 42001ISO-4200138 controls
Executive Order 14110EO-14110Section 4 requirements
DoD AI Ethics PrinciplesDoD-AIE5 principles, 40 practices
OWASP ML Security Top 10OWASP-ML10 vulnerability classes

Drilling Into a Framework

Click any framework tile to open the Framework Detail view, which shows:

  • Full control list with pass/fail status per control
  • Which AI systems contribute to each control’s status
  • The evidence artifact satisfying each passing control
  • The finding linked to each failing control
  • The remediation status for failing controls

Evidence Chain for Audit Responses

When an auditor asks “how do you know system X is compliant with control Y?”, the GOVERN evidence chain provides a formal, traceable answer.

What the Evidence Chain Is

For every passing control in every framework, GOVERN maintains a chain of evidence:

Control Requirement
└─ Policy Rule (in Policy Engine)
└─ Assessment Finding (or passing evaluation)
└─ Evidence Artifact (document, Probe telemetry, or API response)
└─ RDL Proof Trace (formal logical proof)
└─ Timestamp + Assessment ID (immutable record)

The RDL proof trace is the key artifact. Unlike a human reviewer’s judgment, an RDL proof trace is a formal mathematical result — it shows exactly which evidence satisfied exactly which logical conditions in the governance rule.

Accessing the Evidence Chain

Via Dashboard: Compliance → [Framework] → [Control] → “View Evidence”

Via API:

Terminal window
curl "https://api.govern.archetypal.ai/v1/compliance/evidence?framework=nist_800_53&control=RA-3&system_id=sys_01HXXXXXXXXXXX" \
-H "Authorization: Bearer gvn_live_xxxxxxxxxxxx"

Response:

{
"control": "RA-3",
"title": "Risk Assessment",
"status": "PASSING",
"last_evaluated": "2026-04-10T08:00:00Z",
"evidence_chain": [
{
"artifact_id": "art_01HXXXXXXXXXXX",
"type": "document",
"filename": "risk_assessment_2026_q1.pdf",
"submitted_at": "2026-04-01T14:22:00Z"
},
{
"assessment_id": "asmnt_01HXXXXXXXXXXX",
"verdict": "PASS",
"score": 0.94,
"evaluated_at": "2026-04-10T08:00:00Z"
},
{
"proof_trace_id": "proof_01HXXXXXXXXXXX",
"rdl_rule": "RA-3.risk_assessment.documented_methodology",
"result": "SATISFIED",
"proof_url": "https://govern.archetypal.ai/proofs/proof_01HXXXXXXXXXXX"
}
]
}

Exporting for Auditors

Generate a full evidence package for any framework — formatted for direct submission to auditors or inclusion in an ATO package:

Via Dashboard: Compliance → [Framework] → “Export Evidence Package” → select date range and format (PDF / JSON / Excel)

Via API:

Terminal window
curl -X POST "https://api.govern.archetypal.ai/v1/compliance/reports" \
-H "Authorization: Bearer gvn_live_xxxxxxxxxxxx" \
-H "Content-Type: application/json" \
-d '{
"framework": "nist_800_53",
"system_ids": ["sys_01HXXXXXXXXXXX"],
"include_evidence_chain": true,
"include_proof_traces": true,
"format": "pdf",
"date_range": {
"from": "2026-01-01",
"to": "2026-04-12"
}
}'

The exported package includes: framework overview, control-by-control status, evidence artifacts, RDL proof traces, finding history with remediation records, and policy audit trail.


Real-Time Policy Violation Tracking

The Active Violations panel shows all currently open policy violations in real time — updated as Probe telemetry flows in.

Violation Feed

The violation feed shows:

ColumnDescription
TimestampWhen the violation occurred
SystemWhich AI system triggered the violation
PolicyWhich policy rule was violated
EnforcementBlock (request was stopped) or Warn (request was allowed)
SeverityMEDIUM / HIGH / CRITICAL
StatusOpen / Acknowledged / Resolved

Filtering Violations

Use the filter bar to narrow the violation feed:

  • By framework — show only violations that map to a specific compliance framework
  • By system — focus on one AI system
  • By enforcement mode — Block-mode violations indicate real-time governance stops; Warn-mode violations indicate potential issues allowed through
  • By severity — CRITICAL and HIGH violations should be triaged first
  • By status — open violations need attention; acknowledged violations are being worked

Violation Detail

Click any violation to open the detail view:

  • Full input/output context (redacted per your data policy configuration)
  • Which RDL rule triggered and why
  • Framework controls affected — which compliance controls this violation puts at risk
  • Remediation recommendation — specific steps to prevent recurrence
  • Linked finding — the Findings record in the Remediation Tracker

Acknowledging Violations

Acknowledging a violation marks it as known and under investigation. It does not resolve it — it removes it from the “unreviewed” queue.

Via Dashboard: Click violation → “Acknowledge” → enter a note

Via API:

Terminal window
curl -X POST "https://api.govern.archetypal.ai/v1/alerts/vio_01HXXXXXXXXXXX/acknowledge" \
-H "Authorization: Bearer gvn_live_xxxxxxxxxxxx" \
-H "Content-Type: application/json" \
-d '{"note": "Under investigation — reviewing with ML team"}'

Policy Violation Trend

The Violation Trend chart (Compliance → Policy Violations → Trend) shows:

  • Violation volume by day/week/month
  • Breakdown by policy, system, and severity
  • Block vs Warn enforcement split
  • Week-over-week comparison

Use the trend view to identify:

  • Systems with persistently high violation rates (may indicate a misconfigured policy or a drifting system)
  • Sudden spikes (may indicate a model update, configuration change, or attack)
  • Downward trends (governance improvements working)

Scheduled Compliance Reporting

Configure automated compliance reports to run on a schedule and deliver to your team, auditors, or your GRC platform.

Creating a Scheduled Report

Via Dashboard: Compliance → Reports → “New Scheduled Report”

Via API:

Terminal window
curl -X POST "https://api.govern.archetypal.ai/v1/compliance/schedules" \
-H "Authorization: Bearer gvn_live_xxxxxxxxxxxx" \
-H "Content-Type: application/json" \
-d '{
"name": "Weekly NIST AI RMF Summary",
"framework": "nist_ai_rmf",
"schedule": "0 9 * * 1",
"recipients": [
"compliance-team@company.com",
"ciso@company.com"
],
"format": "pdf",
"include_evidence_chain": false,
"include_violations": true,
"include_remediation_status": true,
"systems": "all"
}'

Schedule Options

ScheduleCronUse Case
Daily summary0 8 * * *SOC morning briefing
Weekly review0 9 * * 1Team review meeting
Monthly executive0 9 1 * *Board/executive reporting
Quarterly audit0 9 1 1,4,7,10 *Quarterly compliance filing
Pre-ATO sweepOne-time or on-demandFederal ATO package generation

Report Content Options

OptionDescription
include_evidence_chainInclude full RDL proof traces per control
include_violationsInclude policy violation log for the period
include_remediation_statusInclude open/resolved finding counts
include_trendInclude compliance score trend over the period
include_benchmarkCompare score against industry benchmark (Professional+ tier)
executive_summaryOne-page summary suitable for non-technical readers

Delivery Options

Reports can be delivered via:

  • Email — PDF attachment or HTML inline
  • Webhook — JSON payload with report download URL
  • SIEM — structured JSON pushed to your SIEM ingest endpoint
  • GRC platform — ServiceNow, Archer, or custom integration via webhook

On-Demand Reports

Run a report immediately without waiting for the scheduled trigger:

Via Dashboard: Compliance → Reports → select schedule → “Run Now”

Via API:

Terminal window
curl -X POST "https://api.govern.archetypal.ai/v1/compliance/schedules/sched_01HXXXXXXXXXXX/run" \
-H "Authorization: Bearer gvn_live_xxxxxxxxxxxx"

Compliance Dashboard Quick Reference

TaskDashboard Path
Framework overviewCompliance → Overview
Control-level drill-downCompliance → [Framework] → [Control]
Evidence chain for auditorCompliance → [Framework] → [Control] → “View Evidence”
Export audit packageCompliance → [Framework] → “Export Evidence Package”
Active violationsCompliance → Policy Violations → Active
Violation trendCompliance → Policy Violations → Trend
Scheduled reportsCompliance → Reports
Run report nowCompliance → Reports → [Schedule] → “Run Now”