Compliance

Not claims.
Evidence.

Most AI vendors hand you a PDF checklist and call it compliance. Aspexilary hands you a dated, signed evidence report generated live from your system — one your compliance officer can drop directly into an audit binder, verified independently, no vendor assertions required.

Compliance-as-evidence,
not compliance-as-assertion

Regulated industries — healthcare, finance, legal, government — face a fundamental problem with cloud AI: you can never independently verify what the vendor says is happening to your data. You're taking their word for it.

Aspexilary runs on your infrastructure. Every packet, every inference call, every access attempt is observable by you. We don't ask you to trust our compliance claims — we give you the tooling to verify them yourself, live, on demand.

"Your compliance officer should be able to walk into any audit armed with evidence generated by your own systems — not a vendor's self-attestation."

On-premises, air-gapped

Model weights, prompts, and responses never leave your environment. Zero calls to external APIs during inference — provable with packet capture.

Immutable audit trail

Every inference call is logged to an append-only, hash-chained audit store. Any modification to the log is immediately detectable.

Generated evidence reports

On-demand compliance reports map observed system behavior to specific HIPAA, SOC 2, and FedRAMP control IDs — dated, signed, audit-ready.

Data sovereignty

Your data never trains our models. Your inference history stays on your hardware. Compliance with data residency requirements is structural, not contractual.

What we demonstrate
on your infrastructure

Pre-staged · Same-day evidence
Step 01

Network isolation

Live packet capture during inference. Every outbound connection is visible. You'll see only localhost — zero calls to OpenAI, Azure, or any external API.

HIPAA §164.312(e) SOC 2 C1.1
Step 02

Audit log & tamper detection

Submit a prompt, watch it appear in the hash-chained audit log within milliseconds. Attempt to modify a record — the chain immediately identifies the tampering.

HIPAA §164.312(b) FedRAMP AU-9
Step 03

Access control

Demonstrate an unauthorized role being blocked at the inference endpoint. The denied attempt is logged with timestamp, user hash, and reason code.

HIPAA §164.312(a) SOC 2 CC6.1
Step 04

PHI policy checks

Prompts containing PHI patterns — SSN, DOB, credit card numbers — are flagged and logged. The PHI is never stored in plaintext; only a hash is retained.

HIPAA minimum necessary SOC 2 CC7.3
Step 05

Evidence report generation

A dated, signed compliance report is generated live from your system's actual audit data — not a pre-filled template. Covers the full reporting period you specify.

All frameworks FedRAMP AU-3
Step 06

Q&A with your CISO

Architecture diagram, data flow documentation, and network diagrams delivered under NDA. Audit middleware source available for technical review.

Architecture review NDA available

Control mapping

Each capability maps to specific control IDs across HIPAA Technical Safeguards, SOC 2 Trust Service Criteria, and FedRAMP. No ambiguity. No marketing language.

Capability HIPAA SOC 2 FedRAMP
On-premises, air-gapped inference §164.312(e)(1) C1.1 SC-8
Append-only, hash-chained audit log §164.312(b) CC7.2 AU-2 AU-9
Role-based access control at inference endpoint §164.312(a)(1) CC6.1 CC6.2 SC-28
PHI pattern detection & hash-only storage §164.312(c)(1) CC7.3 SI-3
Person authentication & session tracking §164.312(d) CC6.2 IA-2
TLS enforcement for all API surfaces §164.312(e)(2) C1.1 SC-8
Generated compliance evidence reports All above All above AU-3

What the evidence
report looks like

This is a representative excerpt from a generated compliance report. Your actual report is produced live from your audit log and covers the exact period you specify.

aspexilary_compliance_report_20260304.html
2,847
Inference calls logged
3
Policy flag events
✓ Intact
Hash chain integrity
HIPAA §164.312(b) — Audit Controls
§164.312(b)
Pass
SOC 2 CC7.2 — System Monitoring
CC7.2
Pass
FedRAMP AU-9 — Protection of Audit Information
AU-9
Pass
HIPAA §164.312(e)(1) — Transmission Security
§164.312(e)(1)
Pass

Ready to see it
on your infrastructure?

We pre-stage everything with your infrastructure team the day before — typically two to three hours. The verification session runs on your hardware, watched by your compliance officer. They leave with a dated evidence report generated from your own audit log — not a vendor self-attestation.

Request a Proof Session

info@aspexilary.ai  ·  NDA available on request  ·  Pre-call infrastructure setup included