SOC 2 Trust Services Criteria
AICPA's audit framework for service organisations: security, availability, confidentiality, processing integrity, privacy.
KYE™ bindings: access reviews → /v1/graph/authority-path; audit evidence → signed evidence packs; change management → KYE™ audit chain; incident evidence → KYE™ Self-Audit™ runs.
AICPA SOC 2 →
ISO 27001:2022 ISMS
Information Security Management System. Annex A controls cover access, asset/entity inventory, privileged access, logging, supplier and incident management.
KYE™ bindings: entity inventory → KYE™ entity registry; privileged access → capability + state model; logging → KYE™ audit chain; supplier management → KYE™ delegation chain across trust domains.
ISO 27001:2022 →
ISO 42001 AI Management System
First international standard for AI management: inventory, responsibility mapping, risk/impact, lifecycle controls, oversight logs.
KYE™ bindings: AI inventory → KYE™ entity (agent, model) registry; responsibility → delegation chain; oversight logs → KYE™ audit chain + Decision Map™.
ISO/IEC 42001 →
EU AI Act Regulation 2024/1689
EU regulation on AI systems & agents. Title III high-risk obligations: risk classification, data governance, technical documentation, human oversight, post-market monitoring.
KYE™ bindings (10 controls): kye-euaiact-1.0 profile binds entity accountability, AI system registry, capability + risk classification, human-oversight gates, runtime authority decision logs, technical-documentation evidence pack, corrective action trail, role mapping, high-risk workflow profile, post-market monitoring hooks.
EUR-Lex 2024/1689 →
NIST AI RMF 1.0
US framework: Govern / Map / Measure / Manage AI risk lifecycle.
KYE™ bindings: Govern → delegation chain + role mapping; Map → capability registry; Measure → signal bus + telemetry; Manage → cascade revocation + recovery profile.
NIST AI RMF →
PCI DSS 4.0 Payment-card data
Payment-card industry data security standard. Covers credential state, payment-capability gating, wallet authority, audit logs.
KYE™ bindings: credential state → KYE™ state model; payment-capability gating → kye-payments-1.0; wallet authority → capability + delegation; audit → KYE™ audit chain + signed proof bundle.
PCI SSC →
PSD2 / PSD3 EU Payment Services Directive
Strong customer authentication, third-party access (TPP), open banking, agent-action liability under PSD3.
KYE™ bindings: SCA evidence → credential state; TPP delegation → KYE™ delegation chain (TPP → PSP → user); per-action authority → POST /v1/runtime/authorize; audit → signed proof bundle.
EC PSD →
DORA Digital Operational Resilience Act
EU regulation on ICT third-party authority, operational resilience, incident response, auditability for financial entities.
KYE™ bindings: third-party authority → KYE™ delegation chain + trust-domain federation; incident evidence → KYE™ audit chain + Blast Radius Map™; operational resilience → recovery + break-glass profiles.
EIOPA DORA →
NIS2 EU cybersecurity directive
EU directive: cybersecurity governance, incident traceability, supply-chain controls, access authority for essential and important entities.
KYE™ bindings: incident traceability → KYE™ audit chain; supply-chain → capability registry + attestation; access authority → KYE™ delegation + scope.
EC NIS2 →
GDPR / UK GDPR Data protection
Role mapping (controller / processor / sub-processor), lawful authority trail, data access, automated decision governance, audit.
KYE™ bindings: role mapping → entity types + delegation; lawful authority → consent credential + scope; right-to-erasure → lifecycle tombstoned + redaction obligations.
GDPR.eu →
HIPAA US health-data protection
Healthcare entity access, minimum-necessary principle, emergency / break-glass, audit trails for PHI.
KYE™ bindings: minimum-necessary → capability scope; consent → credential entity; break-glass → recovery profile + signed time-boxed flow; audit → KYE™ audit chain with PHI redaction obligation.
HHS HIPAA →
NIST 800-207 Zero-Trust Architecture
US federal zero-trust reference: identity, device, network, application, data telemetry signals continuously inform every decision.
KYE™ bindings: continuous evaluation → KYE™ state model; per-request decision → embedded PDP; signal-driven invalidation → KYE™ signal bus + cascade.
NIST SP 800-207 →
NIST CSF Cybersecurity Framework 2.0
Govern / Identify / Protect / Detect / Respond / Recover. The headline US cybersecurity reference.
KYE™ bindings: Govern → trademark + governance docs; Identify → entity registry; Protect → KYE™ authorize + state; Detect → signal bus; Respond → cascade revocation; Recover → recovery + break-glass profiles.
NIST CSF →
FedRAMP US federal cloud authorisation
Standardised authorisation programme for cloud services used by US federal agencies. Builds on NIST 800-53 + 800-207.
KYE™ bindings: Continuous monitoring → KYE™ Self-Audit™ Cloud; access boundary → trust-domain federation; evidence pack → KYE™ evidence-pack generator with public-key verification.
FedRAMP →