Skip to main content

Compliance Frameworks

The Trusera platform evaluates scan results against industry compliance frameworks to help organizations meet regulatory requirements and security standards. AI-BOM findings are automatically mapped to framework categories.

Supported frameworks

OWASP LLM Top 10

The OWASP Top 10 for LLM Applications identifies the most critical security risks in LLM-based applications.

IDRiskAI-BOM mapping
LLM01Prompt InjectionAI agent nodes without input validation, unguarded tool use
LLM02Insecure Output HandlingLLM outputs routed to code execution without sanitization
LLM03Training Data PoisoningUnverified model sources, unpinned model versions
LLM04Model Denial of ServiceUnbounded token limits, missing rate limiting
LLM05Supply Chain VulnerabilitiesShadow AI, unvetted AI packages, deprecated SDKs
LLM06Sensitive Information DisclosureHardcoded API keys, credentials in workflow JSON
LLM07Insecure Plugin DesignMCP servers without auth, tool chains without guardrails
LLM08Excessive AgencyAI agents with unrestricted tool access, code execution
LLM09OverrelianceAI components without human-in-the-loop controls
LLM10Model TheftExposed model files, unprotected model endpoints

EU AI Act

The EU AI Act (effective August 2025) requires organizations to maintain transparency about AI systems. Article 53 mandates a complete AI component inventory.

AI-BOM supports EU AI Act compliance by:

  • Component inventory - Generating a complete Bill of Materials for all AI components
  • Risk classification - Mapping components to EU AI Act risk categories
  • Documentation - CycloneDX and SPDX output formats meet SBOM requirements
  • Continuous monitoring - Scheduled scans detect new AI components as they are introduced

Key EU AI Act requirements mapped to AI-BOM capabilities:

RequirementAI-BOM capability
Article 53 - AI component transparencyFull AI inventory with CycloneDX SBOM output
Article 9 - Risk management0-100 risk scoring with severity classification
Article 15 - Accuracy and robustnessDetection of deprecated models and unpinned versions
Article 13 - TransparencySource location tracking for every detected component
Article 17 - Quality managementCI/CD integration with policy enforcement

OWASP Agentic Security Top 10

The OWASP Top 10 for Agentic Security addresses risks specific to AI agent architectures.

IDRiskAI-BOM mapping
ASI01Agent Identity SpoofingMCP servers without authentication
ASI02Tool MisuseCode execution tools connected to AI agents
ASI03Privilege EscalationAgents with unrestricted system access
ASI04Memory PoisoningVector store configurations without access controls
ASI05Resource ExhaustionUnbounded agent loops, missing timeout configurations
ASI06Agent Communication TamperingA2A protocol without encryption
ASI07Cascading FailuresMulti-agent chains without circuit breakers
ASI08Data ExfiltrationAgents with network access and sensitive data
ASI09Audit EvasionAI operations without logging
ASI10Supply Chain CompromiseUnverified agent packages and MCP servers

Custom rules (v2)

The platform supports custom compliance rules for organization-specific requirements. Rules are created via the API and evaluated against scan results.

Creating a custom rule

curl -X POST https://your-instance.trusera.dev/api/v1/compliance/rules \
-H "Authorization: Bearer <token>" \
-H "Content-Type: application/json" \
-d '{
"name": "No hardcoded API keys",
"description": "All API keys must use environment variables or secret managers",
"framework": "custom",
"condition": {
"field": "flags",
"operator": "contains",
"value": "hardcoded_api_key"
},
"severity": "critical"
}'

Rule conditions

FieldOperatorsDescription
flagscontains, not_containsCheck component risk flags
severityeq, gte, lteCheck component severity level
risk_scoregt, gte, lt, lte, eqCheck numeric risk score
typeeq, inCheck component type
providereq, in, not_inCheck AI provider
nameeq, contains, matchesCheck component name

Example rules

Block all hardcoded credentials:

{
"name": "No hardcoded credentials",
"condition": {
"field": "flags",
"operator": "contains",
"value": "hardcoded_credentials"
},
"severity": "critical"
}

Maximum risk score:

{
"name": "Risk score under 80",
"condition": {
"field": "risk_score",
"operator": "lt",
"value": "80"
},
"severity": "high"
}

Block specific providers:

{
"name": "No DeepSeek in production",
"condition": {
"field": "provider",
"operator": "eq",
"value": "deepseek"
},
"severity": "high"
}

Managing rules

OperationEndpointRequired role
CreatePOST /api/v1/compliance/rulesEditor
ListGET /api/v1/compliance/rulesAny authenticated user
UpdatePUT /api/v1/compliance/rules/:idEditor
DeleteDELETE /api/v1/compliance/rules/:idEditor

CLI policy enforcement

For CI/CD pipelines, use the --policy flag with a YAML policy file:

# .ai-bom-policy.yml
max_critical: 0
max_high: 5
max_risk_score: 75
block_providers: []
block_flags:
- hardcoded_api_key
- hardcoded_credentials
ai-bom scan . --policy .ai-bom-policy.yml --quiet

This returns exit code 1 if any policy violations are found, making it suitable for CI gates.