Skip to content
Mastery9 sectionsBy SpanForge

AI Governance & Compliance Mastery

The complete cross-framework study guide. Covers EU AI Act, GDPR, HIPAA, SOC 2, ISO 42001, and NIST AI RMF — plus technical governance architecture, a maturity model, failure modes, and scenario-based workbook. Start here before reading any framework guide.

← All guides

AI Governance & Compliance Mastery

Complete Study Guide + Reference

Including Governance Maturity Model, Failure Modes, and Citations

Brought to you by SpanForge | getspanforge.com | May 2026


Quick Navigation


Introduction

Observability does not equal compliance evidence.

This foundational insight shapes everything that follows. A system can generate terabytes of logs, alerts, and dashboards — and still fail a regulatory audit because none of it constitutes proof that risk was assessed, governed, and responded to.

This guide closes that gap. It covers six regulatory frameworks, the technical architecture needed for governance-native AI, organizational implementation, and the failure modes that destroy compliance programs in production.

By the end, you will have:

  • Comprehensive framework knowledge (6 standards)
  • A maturity model to assess your current state
  • Real failure modes to learn from and avoid
  • Self-assessment tools
  • Complete academic and regulatory citations

Part 1: Regulatory Frameworks (6 Standards)

1. EU AI Act (Articles 6–29)

Status: Entered force August 2023. Enforcement phased through 2026–2027.

Key Articles:

ArticleRequirement
Article 6High-risk AI classification (Annex III)
Articles 8–15Risk management, data governance, record-keeping, human oversight
Article 14Meaningful human oversight for high-risk decisions
Article 29Transparency requirements

Annex III High-Risk Categories:

CategoryExamples
Education & TrainingAdmissions screening, exam scoring
Employment & LaborHiring screeners, performance AI
Credit & BankingLoan approval, credit scoring
Law EnforcementCrime detection, risk scoring
Immigration & BorderVisa, asylum decisions
Healthcare & MedicineDiagnostics, treatment recommendations
Critical InfrastructureElectricity, water, transport control
Benefits & Social ServicesEligibility decisions
Law Enforcement Risk AssessmentBail, sentencing recommendations

Fines:

ViolationMaximum Fine
Prohibited AI or high-risk violations€30M or 6% of global revenue
Documentation and governance failures€20M or 4% of global revenue
Transparency violations€10M or 2% of global revenue

Key insight: EU AI Act demands auditable AI — proof you assessed risk before deployment, monitored it in production, and escalated when you found problems.


2. GDPR (Articles 5, 9, 13–14, 32)

Status: In force since May 2018. Active enforcement. AI-specific enforcement increasing significantly.

Data protection law constraining AI operations.

Article 5 — Five Core Principles:

PrincipleWhat It Means for AI
Lawfulness, Fairness, TransparencyDocument lawful basis; inform users of AI use
Purpose LimitationData collected for one purpose cannot be reused without further legal analysis
Data MinimisationOnly process what is strictly necessary
AccuracyKeep data accurate; allow corrections to AI outputs
Storage LimitationDelete personal data when no longer needed
Integrity & ConfidentialityEncrypt, access-control, and audit all processing

Article 9 — Special category data restrictions: health, racial/ethnic origin, political opinions, religious beliefs, trade union membership, genetic data, biometric data, sexual orientation.

Article 32 — Security of processing: encryption, access control, regular testing.

Fines:

ViolationMaximum Fine
Core principle violations (Articles 5, 6, 9)€20M or 4% of global annual turnover
Data subject rights violations (Articles 12–22)Up to €20M or 4% of global annual turnover
Procedural violations€10M or 2% of global annual turnover

3. HIPAA (Safe Harbor)

Status: US federal law. Applies to covered entities and business associates handling Protected Health Information (PHI).

The 18 Safe Harbor Identifiers (must be removed or masked):

#Identifier#Identifier
1Names10Account numbers
2Geographic data (sub-state)11Certificate/license numbers
3Dates (except year)12Vehicle identifiers
4Phone numbers13Device identifiers
5Fax numbers14Web URLs
6Email addresses15IP addresses
7Social Security numbers16Biometric identifiers
8Medical record numbers17Full-face photographs
9Health plan beneficiary numbers18Any other unique identifying number

The LLM Re-Identification Risk: Standard de-identification removes the 18 identifiers. But LLMs can reconstruct identity from prose — combining diagnosis, location, age range, and dates in a way that uniquely identifies a patient. Safe Harbor alone does not address this risk.

Breach Notification:

  • Notify affected individuals: within 60 days, without unreasonable delay
  • Notify HHS: within 60 days (immediate if >500 affected in a state)
  • Media notification: if >500 individuals in a jurisdiction

4. SOC 2 (Trust Service Criteria)

Status: AICPA standard. Required by most enterprise B2B customers. AI systems increasingly require SOC 2 attestation.

The 5 Trust Service Categories:

CategoryWhat It Covers
Security (CC)Access controls, change management, incident response — required for all SOC 2
Availability (A1)System availability commitments and recovery objectives
Processing Integrity (PI)Processes data completely, accurately, and in a timely manner
Confidentiality (C)Information designated confidential is protected
Privacy (P)Personal information collected and used per commitments

Key Criteria for AI Systems:

CriteriaWhat It Covers for AI
CC6Who can access your AI systems and training data?
CC7How do you detect anomalies in AI behavior?
CC8How do you govern AI model updates and deployments?
CC9How do you assess and mitigate AI-specific risks?

What Auditors Look For: Evidence of controls being followed — not just documentation of controls. Audit logs, incident reports, and change management records showing actual enforcement.


5. ISO 42001:2023

Status: Published December 2023. AI Management Systems standard. Early adoption phase — industry interpretation still maturing. Auditor approaches vary.

Structure (Plan-Do-Check-Act):

PhaseSectionsKey Activities
Plan4–6Context, leadership, risk & impact assessment
Do7–8Support, operational controls, AI system lifecycle
Check9Performance evaluation, monitoring, internal audit
Act10Improvement, nonconformity management

Key Requirements:

SectionRequirement
6.1Risk and AI impact assessment
8.2AI system design and development controls
8.3AI system operation controls
8.4Third-party AI system controls
9.1Monitoring, measurement, and evaluation

Important caveat: ISO 42001 is a management system standard — it doesn't prescribe specific technical controls. It requires a documented, systematic approach to managing AI risks across the organization.


6. NIST AI Risk Management Framework (AI RMF 1.0)

Status: Published January 2023. Voluntary US framework. Widely referenced in contracts, procurement, and policy.

The Four Core Functions:

FunctionWhat It Means
GovernEstablish organizational strategy for AI risk; define accountability; create policies; cultivate culture
MapCategorize AI systems by context and risk; identify stakeholders; document purpose, limitations, assumptions
MeasureQuantify AI risks (bias, reliability, security, explainability); establish metrics; test and evaluate
ManageImplement risk responses; prioritize residual risks; plan for incidents; communicate with stakeholders

Key insight: NIST AI RMF is designed to complement other frameworks — not replace them. It maps well to EU AI Act, ISO 42001, and SOC 2.


Part 2: Technical Governance Architecture

The Three-Layer Governance Stack

Governance-native AI requires infrastructure across three layers:

Layer 3: Risk Management
├── Human-in-the-loop escalation
├── Behavioral drift detection
├── Alert routing and SLA management
└── Framework compliance mapping

Layer 2: Evidence Generation
├── HMAC-SHA256 audit chaining
├── WORM storage
├── Framework-mapped evidence bundles
└── Auditor-ready report generation

Layer 1: Instrumentation
├── Decision capture (every AI output)
├── PII detection and redaction
├── Secret scanning (API keys, tokens)
├── Policy enforcement gates
└── OpenTelemetry-aligned spans

HMAC-SHA256 Cryptographic Chaining

The Problem: Standard audit logs can be edited. A database admin can change a log entry, making logs alone insufficient to prove records haven't been tampered with.

The Solution: Each record includes a cryptographic hash of its own content plus the previous record's hash:

Record N hash = HMAC-SHA256(Record N content + Record N-1 hash)

If any record is modified, its hash changes — which invalidates every subsequent hash. The chain breaks, making tampering immediately detectable.

What this proves to auditors:

  • Records have not been modified since creation
  • The sequence of events is accurate
  • No records have been deleted from the middle of the chain

PII Detection: Three-Layer Approach

LayerMethodWhat It Catches
Layer 1: Pattern MatchingRegular expressionsStructured PII: SSNs, phones, emails, credit cards
Layer 2: Model-BasedNamed entity recognition (NER)Names, organizations, locations in unstructured prose
Layer 3: Entropy AnalysisStatistical analysisAPI keys, tokens, passwords, high-entropy secrets

The Gap Standard Approaches Miss: Context-dependent re-identification — where a combination of non-PII attributes (age range + location + diagnosis + dates) uniquely identifies an individual. Requires semantic analysis beyond pattern matching. Particularly critical for HIPAA compliance with LLM outputs.


Policy Enforcement Gates

Policy enforcement must happen before data persists, not after.

GateWhat It Enforces
PII gateBlocks or redacts personal data before it enters the audit chain
Secret gateDetects and blocks API keys, tokens, credentials in outputs
Confidence gateRoutes low-confidence decisions to human review
Drift gateBlocks or flags outputs when model behavior deviates from baseline
Compliance gateEnforces policy rules (prohibited content, required disclosures)

AI Explainability

SHAP (SHapley Additive exPlanations)

  • Assigns each feature an importance value for a specific prediction
  • Mathematically grounded in game theory; model-agnostic
  • Computationally expensive for large models
  • Reference: Lundberg & Lee (2017)

LIME (Local Interpretable Model-agnostic Explanations)

  • Creates a local approximation of model behavior around a specific prediction
  • Faster than SHAP for large datasets; less mathematically rigorous
  • Reference: Ribeiro, Singh & Guestrin (2016)

Model Cards

  • Structured documentation of model purpose, performance, and limitations
  • Should include: intended use, out-of-scope uses, evaluation data, metrics, ethical considerations
  • Increasingly required for high-risk AI deployments

The Six Types of AI Drift

Drift TypeWhat ChangesDetection Method
Embedding driftStatistical distribution of input representationsMonitor embedding space distances
Semantic driftMeaning of inputs (distribution may appear stable)Track semantic similarity scores
Retrieval/RAG driftRetrieved documents become less relevantMonitor retrieval relevance scores
Evaluation driftModel performance on labeled data degradesRegular benchmark testing
Prompt driftUser prompt patterns shift, affecting outputsTrack prompt clustering
Grounding degradationFactual accuracy of outputs decreases over timeMonitor against ground truth

Part 3: Observability as Strategic Infrastructure

Observability vs. Compliance Evidence

ObservabilityCompliance Evidence
Answers: "What is happening?"Answers: "Can I prove what happened?"
Mutable logsTamper-evident, signed records
Vendor-specific formatsFramework-mapped, portable
Operational focusAudit focus
Real-time dashboardsHistorical evidence bundles
Detects problemsProves you responded to problems

The gap that gets organizations fined: Having observability without compliance evidence. Regulators don't want to see that you have monitoring. They want proof that monitoring produced evidence you acted on.


OpenTelemetry: The Governance-Neutral Foundation

OpenTelemetry (OTel) is the CNCF standard for telemetry data — traces, metrics, and logs. It provides a vendor-neutral foundation for AI governance infrastructure.

Why OTel matters for governance:

PropertyValue
PortabilityTelemetry data is not locked to a single vendor
StandardizationConsistent data format across all systems
IntegrationConnects to Datadog, Grafana, Splunk, and any observability platform
AuditabilityStructured data is easier to sign and verify

The Governance Layer on Top of OTel: Standard OTel captures what happened. Governance infrastructure also needs to capture proof that you managed it — through cryptographic signing of spans, framework-level tagging (which article/requirement does this satisfy?), and automated evidence bundling.


Vendor-Neutral Architecture Principles

  1. Instrument at the SDK layer — before data reaches any specific vendor
  2. Use open protocols — OTel, JSON, standard formats
  3. Separate storage from analysis — raw signed records stored independently from analysis tools
  4. Framework-mapped exports — evidence bundles portable and not dependent on a specific platform to read

Part 4: Organizational Implementation

The COSO Framework Applied to AI Governance

COSO ComponentAI Governance Application
Control EnvironmentLeadership commitment to AI governance; clear accountability structures
Risk AssessmentPre-deployment risk assessment; ongoing risk monitoring
Control ActivitiesPolicy enforcement gates; human review workflows; change management
Information & CommunicationAudit trails; incident reporting; governance dashboards
Monitoring ActivitiesDrift detection; compliance metrics; audit cycle

The T.R.U.S.T. Scorecard

A board-level framework for measuring AI trustworthiness:

DimensionWhat It MeasuresKey Metrics
T — TransparencyCan the organization explain AI decisions?Explainability coverage, audit log completeness
R — ReliabilityDoes the AI perform consistently and accurately?Accuracy rates, drift frequency, incident rate
U — User TrustDo users trust and understand the AI?Override rates, complaint rates, appeal volume
S — SecurityIs the AI protected against attacks?Adversarial test results, breach incidents
T — TraceabilityCan every decision be traced back to its inputs?Audit trail coverage, evidence bundle quality

Organizational Roles in AI Governance

RoleResponsibilityKey Outputs
AI System OwnerEnd-to-end accountability for a specific AI systemRisk assessment, governance policy
ML EngineerTechnical implementation of governance controlsInstrumented pipelines, drift detection
Compliance OfficerFramework interpretation and evidence reviewFramework mapping, audit readiness
Data Protection OfficerPrivacy compliance (GDPR, HIPAA)DPIAs, RoPA, breach response
CISO / SecuritySecurity of AI systems and dataSecurity audits, incident response
LegalRegulatory interpretationLawful basis documentation, contract review
Executive SponsorBoard-level accountabilityT.R.U.S.T. scorecard, governance strategy

The Limits of Governance

Governance CAN:

  • Prove that risk was assessed before deployment
  • Prove that monitoring was in place
  • Prove that incidents were detected and responded to
  • Prove that human oversight was applied
  • Generate auditor-ready evidence

Governance CANNOT:

  • Make a biased model unbiased
  • Make an inaccurate model accurate
  • Prevent all harms from AI systems
  • Substitute for appropriate model development and testing
  • Guarantee regulatory compliance (compliance is a legal determination)

Part 5: Governance Maturity Model

Five levels of maturity from reactive to governance-native:

LevelStateCharacteristicsAudit Outcome
1: ReactiveNo governanceLogs exist but are mutable. Risk assessment done retroactively. No policies enforced.Non-compliant findings
2: ObservabilityLogs and dashboards existMonitoring in place. Records mutable, no policy enforcement, no framework mapping.Partial compliance
3: Policy EnforcementPolicies enforcedPII redaction, drift alerts, escalation paths in place. Evidence mapping is manual.Framework alignment gap
4: Evidence AutomationHMAC-signed, auto-mapped bundlesEvidence generation automatic. Audit cycle reduces from weeks to days.Strong compliance, 2-week audit cycle
5: Governance-NativeGovernance embedded in engineeringCompliance is a property of the system, not a separate process. Continuous evidence generation.Governance advantage

Moving Between Levels

Level 1 → 2: Deploy logging and monitoring. Table stakes — necessary foundation, but not compliance.

Level 2 → 3: Add policy enforcement. PII detection, secret scanning, confidence thresholds, escalation workflows. Move from observation to control.

Level 3 → 4: Automate evidence generation. Add cryptographic signing, framework mapping, evidence bundling. Move from manual to automatic proof.

Level 4 → 5: Embed governance in engineering culture. Compliance is no longer just a compliance team responsibility — it's built into every deployment, every model update, every incident response.


Part 6: Common Governance Failure Modes

Understanding failure modes is as important as knowing what should go right.

Failure Mode 1: Alerts Exist but Are Ignored

Symptom: Drift alerts fire weekly. Nobody investigates.

Why it matters: Auditor asks "show me how you responded to drift." Ignored alerts don't constitute a compliance defense — they document negligence.

Fix:

  • Reduce false positives (tune alert baseline from production data)
  • Clear ownership: one person per alert type
  • SLA: investigate within 4 hours, close within 24 hours
  • Document all investigations — the audit trail of your response matters as much as the alert itself

Failure Mode 2: Policies Exist but Aren't Enforced

Symptom: "All changes require review." Sometimes they do, sometimes they don't.

Why it matters: Inconsistent enforcement documents negligence more clearly than no policy at all. Regulators view "policy exists but wasn't followed" as evidence of systemic failure.

Fix: Automate enforcement. Make it technically impossible to bypass policy review. If a human can skip the gate, eventually a human will skip the gate.


Failure Mode 3: Audit Logs Are Mutable

Symptom: Logs stored in a database with admin access. Records could be edited without detection.

Why it matters: You cannot prove records haven't been tampered with. Regulators increasingly require tamper-evident records — especially for financial, healthcare, and employment AI decisions.

Fix: HMAC chaining + WORM (Write Once Read Many) storage + separation of duties. No single person should be able to modify records without detection.


Failure Mode 4: Human Oversight Only on Paper

Symptom: "High-risk decisions require human review." Humans route them through without reading.

Why it matters: EU AI Act Article 14 requires meaningful human oversight. Rubber-stamping is not oversight. Regulators will ask how long reviewers spend per decision and whether they have the information needed to actually review.

Fix:

  • Reduce escalation volume (route only genuinely ambiguous decisions)
  • Give reviewers context: why was this flagged? What was the AI's reasoning?
  • Track reviewer decisions and give feedback on past outcomes
  • Allow enough time to actually review — not 30 decisions per hour

Failure Mode 5: Alert Fatigue Masks Real Drift

Symptom: Real drift goes undetected because the team has learned to ignore alerts — because you also alert on "0.02% latency change."

Why it matters: When everything is urgent, nothing is.

Fix:

  • Strict alert criteria: only alert on genuinely significant deviations
  • Triage by severity: P1 (immediate), P2 (same day), P3 (weekly review)
  • Monthly false positive rate review — if >20% of alerts are false positives, tune thresholds
  • Separate operational alerts from compliance alerts

Failure Mode 6: Retention Policy Conflicts With Compliance Requirements

Symptom: Compliance requires a 7-year audit trail. Operations wants logs deleted after 90 days.

Why it matters: The organization is simultaneously violating its own retention policy and regulatory requirements. Neither team knows, because they've never discussed it.

Fix:

  • Separate hot and cold storage: operational logs (90-day) vs. compliance records (7-year)
  • Calculate the true cost of compliance storage — far less than the cost of a regulatory fine
  • Make retention policy a governance decision, not an operations decision

Failure Mode 7: Framework Mapping Is Manual

Symptom: You generate evidence. A compliance analyst manually tags which regulatory articles each piece satisfies. This takes weeks before each audit.

Why it matters: Manual mapping is slow, error-prone, and doesn't scale. As AI systems multiply, manual mapping becomes the bottleneck for every audit.

Fix: Automate mapping. Each policy enforcement action should automatically tag which framework clause it satisfies. Evidence bundles generated from tags, not assembled manually.


Part 7: Scenario-Based Workbook

Scenario 1: Healthcare AI — Treatment Recommendation Challenged

Situation: Your LLM-based clinical decision support tool recommends against a treatment. A patient's representative requests an explanation and challenges the decision.

What auditors ask:

  • Can you show the exact inputs that produced this recommendation?
  • Was a human clinician involved in the final decision?
  • Is the model's output explainable in plain language?
  • Was any PHI retained in your logs?

What governance infrastructure provides:

  • Tamper-evident record of the exact input-output pair
  • Human oversight log showing clinician review
  • SHAP-based explanation of contributing factors
  • PII/PHI audit showing what was redacted before logging

Scenario 2: Hiring AI — Discrimination Complaint

Situation: A rejected candidate files a discrimination complaint, alleging your AI hiring system is biased against older workers.

What auditors ask:

  • What were the demographic characteristics of candidates screened?
  • What is your model's false rejection rate by age group?
  • Did you test for age bias before deployment?
  • Have you monitored for age bias since deployment?

What governance infrastructure provides:

  • Pre-deployment risk assessment documenting bias testing
  • Monthly fairness audit logs showing demographic distribution
  • Drift detection records showing any change in demographic patterns
  • Evidence bundle mapping to EU AI Act Article 9

Scenario 3: Financial AI — Regulatory Investigation

Situation: A financial regulator opens an investigation into your credit scoring AI following a pattern of complaints.

What auditors ask:

  • Show me your risk assessment before this system was deployed
  • Show me your governance policy
  • Show me 12 months of monitoring reports
  • Can you prove records haven't been altered?

What governance infrastructure provides:

  • Pre-deployment risk assessment (signed, dated)
  • Governance policy document with version history
  • 12 months of automated monitoring reports
  • HMAC-signed audit trail proving tamper-evidence

Scenario 4: LLM Deployment — Training Data Leak

Situation: A security researcher demonstrates that your customer-facing LLM can be prompted to output PII from its training data.

What auditors ask:

  • Did you test for training data memorization before deployment?
  • Do you monitor for PII in outputs in production?
  • How quickly did you detect and respond?
  • What data was exposed, and to how many people?

What governance infrastructure provides:

  • Pre-deployment testing records including memorization tests
  • Production PII detection logs showing what was caught
  • Incident response timeline with evidence of immediate action
  • Scope assessment records showing exposure extent

Scenario 5: Third-Party AI — Vendor Failure

Situation: A third-party AI vendor you rely on suffers a breach. Your customers' data was processed by their systems.

What auditors ask:

  • What due diligence did you conduct on this vendor?
  • What does your Data Processing Agreement say?
  • How quickly did you detect the breach?
  • How did you notify affected customers?

What governance infrastructure provides:

  • Vendor assessment records
  • DPA documentation
  • Data flow maps showing what went to which vendor
  • Breach response timeline and notification records

Appendix A: Self-Assessment

Rate your current state for each capability:

CapabilityCurrentTarget
Risk AssessmentDocumented, dated, signed
Policy Enforcement100% of deployments reviewed
Audit TrailsTamper-evident, signed, 7+ years
Drift DetectionAutomated, <4hr SLA
Framework MappingAutomatic, 6+ frameworks
Evidence Bundling<5 min auditor-ready bundle
Human OversightMeaningful, documented, auditable
Incident ResponseTested, SLA-bound, documented

Scoring:

  • Mostly unchecked: Maturity Level 1–2 (Reactive / Observability)
  • Partially checked: Maturity Level 3 (Policy Enforcement)
  • Mostly checked: Maturity Level 4–5 (Evidence Automation / Governance-Native)

Appendix B: Full References & Citations

Official Regulatory Texts

NIST Publications

ISO Standards

  • ISO 42001:2023 — Artificial Intelligence — Management system
  • ISO/IEC 27001:2022 — Information security management systems
  • ISO 31000:2018 — Risk management — Guidelines
  • ISO/IEC 23894:2023 — Artificial Intelligence — Guidance on risk management

OpenTelemetry & Infrastructure Standards

Cryptography & Supply Chain

Academic Papers

AI Safety & Security

Enterprise Governance Frameworks

Explainability & Fairness


SpanForge SDK: Cross-Framework Compliance in Practice

The SpanForge SDK provides a single, unified compliance infrastructure that covers all six frameworks in this guide. Rather than building separate systems for each regulation, the ComplianceMappingEngine maps your AI telemetry to the specific clauses of each framework — from one event stream.

Cross-Framework SDK Mapping

FrameworkSDK Framework KeyCore Clauses CoveredPrimary Event Types
EU AI Acteu_ai_actArt. 13 (Transparency), Art. 14 (Human Oversight), Annex IV.5 (Technical Docs)explanation.*, hitl.*, consent.*, llm.guard.*
GDPRgdprArt. 22 (Automated Decisions), Art. 25 (Privacy by Design), Art. 17 (Erasure)consent.*, hitl.*, llm.redact.*
HIPAAhipaa§164.312 (PHI Access Controls & Audit)llm.redact.*, llm.audit.*
ISO 42001iso_42001A.5–A.10 (Full AI Management System controls)Full event set
NIST AI RMFnist_ai_rmfMAP 1.1 (Risk Identification), GOVERN, MEASURE, MANAGEllm.trace.*, llm.eval.*, model_registry.*, explanation.*
SOC 2soc2CC6.1 (Access Controls), CC7.2 (Monitoring), CC8.1 (Change Management)llm.audit.*, llm.trace.*, model_registry.*

Generating Evidence Packages for Any Framework

from spanforge.core.compliance_mapping import ComplianceMappingEngine

engine = ComplianceMappingEngine()

# Generate for any of the six frameworks with the same API
for framework in ["eu_ai_act", "gdpr", "hipaa", "iso_42001", "nist_ai_rmf", "soc2"]:
    package = engine.generate_evidence_package(
        model_id="your-model-id",
        framework=framework,
        from_date="2026-01-01",
        to_date="2026-03-31",
    )
    print(f"{framework}: {package.gap_report}")

The Compliance Event Primitives

Every framework maps to the same underlying event types — this is the architectural insight that makes cross-framework compliance tractable:

Event CategoryEvent TypesFrameworks Served
Consentconsent.granted, consent.revoked, consent.violationGDPR Art. 22, EU AI Act Art. 14
Human-in-the-Loophitl.queued, hitl.reviewed, hitl.escalated, hitl.timeoutEU AI Act Art. 14, GDPR Art. 22, NIST MANAGE
Explainabilityexplanation.generatedEU AI Act Art. 13, NIST MAP 1.1
PII Redactionllm.redact.*GDPR Art. 25, HIPAA §164.312
Audit Loggingllm.audit.*SOC 2 CC6.1, HIPAA §164.312, ISO 42001 A.7
Model Registrymodel_registry.*ISO 42001 A.5, NIST GOVERN, SOC 2 CC8.1
Guardrailsllm.guard.*EU AI Act Annex IV.5, NIST MANAGE

SDK Reference: Compliance & Tenant Isolation · Evidence Export · Enterprise Integrations


Conclusion

You now have:

  • Comprehensive framework knowledge across 6 regulatory standards (EU AI Act, GDPR, HIPAA, SOC 2, ISO 42001, NIST AI RMF)
  • Technical architecture for governance-native AI across all three layers
  • A maturity model to assess your current state and plan the path forward
  • Seven failure modes to recognize and avoid in production
  • Five scenarios showing what governance looks like under real regulatory scrutiny
  • A self-assessment tool to prioritize your next 90 days
  • Complete citations for all frameworks, standards, and research
  1. Complete Appendix A — score your current maturity for each capability
  2. Identify your top 2–3 failure modes — which ones apply to your current systems?
  3. Plan a 90-day roadmap — prioritize by highest regulatory risk and fastest path to Level 3
  4. Work through the scenarios — practice answering the auditor questions for your specific systems
  5. Teach one framework to others — the best way to solidify understanding is to explain it

This positions you at advanced practitioner competency — operating effectively across AI governance, a skill 95% of the field currently lacks.


AI Governance & Compliance Mastery — Complete Study Guide + Reference Brought to you by SpanForge | getspanforge.com | May 2026

Ready to move from understanding to implementation?

Explore more

Browse all compliance guides

See all guides
The platform

Explore the SpanForge SDK

Explore the platform
Talk to SpanForge

Schedule a compliance assessment

Get in touch