Building Compliance Reports
Using Vorion's compliance report generator with OSCAL SSP integration and automated evidence collection.
Building Compliance Reports
Compliance reporting in Vorion is not a manual process of collecting screenshots and writing narratives. The platform generates evidence programmatically from the governance pipeline, proof chain, and test suite, then structures it into machine-readable formats compatible with OSCAL (Open Security Controls Assessment Language).
This guide covers the compliance evidence pipeline, OSCAL SSP generation, and how to wire reports into your audit workflow.
The Evidence Pipeline
Vorion's compliance evidence is generated from three sources:
- Proof Chain -- Cryptographically linked governance decisions
- Test Results -- Automated compliance test outcomes
- Runtime Metrics -- Trust scores, circuit breaker events, anomaly detections
Evidence files are collected in compliance/evidence/ with timestamped
filenames:
compliance/
evidence/
npm-audit-2026-04-02.json # Dependency vulnerability scan
security-latest-2026-04-02.log # SAST scan results
code-reviews-2026-04-02.txt # Review evidence
test-results-2026-04-02.json # Test suite output
proof-chain-export-2026-04-02.json # Proof chain snapshot
governance-matrix.yaml # Control-to-framework mapping
Automated Evidence Collection
The evidence collector runs as part of CI/CD and can be triggered manually:
# Collect all evidence for current state
pnpm compliance:collect
# This runs:
# 1. npm audit --json > compliance/evidence/npm-audit-$(date).json
# 2. Semgrep scan with JSON output
# 3. Test suite with coverage report
# 4. Proof chain export (last 30 days)
# 5. Trust score snapshots for all active agents
Each evidence file includes metadata for traceability:
{
"collectedAt": "2026-04-02T14:30:00Z",
"collector": "vorion-compliance-pipeline",
"version": "3.0.0",
"commitSha": "abc123def456",
"pipelineRunId": "run-789",
"evidenceType": "npm-audit",
"data": { ... }
}
Proof Chain as Evidence
The Proof Plane is the primary evidence source for governance compliance. Every decision made by the platform is recorded as a cryptographically chained event.
Exporting Proof Records
import { ProofPlane } from '@vorionsys/proof-plane';
const proofPlane = new ProofPlane({ /* config */ });
// Export all events for a specific agent
const agentHistory = await proofPlane.getAgentHistory(agentId);
// Export events by type (e.g., all DECISION_MADE events)
const decisions = await proofPlane.queryEvents({
type: 'DECISION_MADE',
startTime: thirtyDaysAgo,
endTime: now,
});
// Export a full trace for a specific request
const trace = await proofPlane.getTrace(correlationId);
// Returns: INTENT_RECEIVED -> DECISION_MADE -> EXECUTION_STARTED
// -> EXECUTION_COMPLETED (or EXECUTION_FAILED)
Verifying Chain Integrity
Before submitting proof chain evidence, verify its integrity:
const verification = await proofPlane.verifyChainAndSignatures({
startIndex: 0,
endIndex: events.length - 1,
});
if (!verification.valid) {
console.error('Broken links:', verification.brokenLinks);
console.error('Invalid signatures:', verification.invalidSignatures);
// Do not submit compromised evidence
}
The verification result is itself evidence -- it proves the chain was intact at verification time. Include the verification result in your compliance package.
OSCAL SSP Integration
OSCAL (Open Security Controls Assessment Language) is a NIST-developed standard for machine-readable compliance documentation. Vorion generates OSCAL System Security Plan (SSP) components that integrate with your existing OSCAL toolchain.
Governance Matrix to OSCAL
The governance matrix (compliance/governance-matrix.yaml) maps Vorion
controls to multiple frameworks:
# compliance/governance-matrix.yaml
controls:
- id: VOR-AC-001
title: "Trust-Tier-Based Access Control"
frameworks:
nist-800-53: ["AC-2", "AC-3", "AC-6"]
nist-ai-rmf: ["GV-2.1", "MP-2.1"]
soc2: ["CC6.1"]
iso-27001: ["A.9.2.3"]
eu-ai-act: ["Art. 14"]
implementation:
component: "packages/basis/src/trust-capabilities.ts"
status: "implemented"
evidence:
- type: "test"
path: "packages/basis/tests/trust-capabilities.test.ts"
- type: "proof-chain"
query: "type=DECISION_MADE"
Generating OSCAL SSP Components
# Generate OSCAL SSP from governance matrix
pnpm compliance:oscal-ssp
# Output: compliance/oscal/ssp-vorion.json
The generated SSP includes:
- System characteristics: Platform version, deployment model, boundaries
- Control implementations: Per-control narrative + evidence links
- Implementation status: Implemented, partial, planned, or not applicable
- Responsible roles: Mapped to RBAC levels
{
"system-security-plan": {
"system-characteristics": {
"system-name": "Vorion AI Governance Platform",
"system-id": "vorion-basis-v3",
"description": "Enterprise AI governance on BASIS specification"
},
"control-implementation": {
"implemented-requirements": [
{
"control-id": "ac-6",
"description": "Agents initialize at trust score 0 with 3 capabilities...",
"implementation-status": "implemented",
"responsible-roles": ["system-administrator"],
"statements": [
{
"statement-id": "ac-6_smt.a",
"description": "35 capabilities across 8 categories, unlocked progressively by trust tier"
}
]
}
]
}
}
}
OSCAL Assessment Results
After evidence collection, generate assessment results:
# Run assessment against SSP
pnpm compliance:assess
# Output: compliance/oscal/assessment-results-2026-04-02.json
Assessment results reference specific evidence artifacts:
{
"finding": {
"control-id": "au-9",
"title": "Protection of Audit Information",
"status": "satisfied",
"observations": [
{
"description": "Proof chain verification passed for 47,832 events",
"evidence": "compliance/evidence/proof-chain-export-2026-04-02.json",
"method": "automated-test"
}
]
}
}
Report Templates
Vorion ships report templates for common audit scenarios.
SOC 2 Type II Report Package
pnpm compliance:report --template soc2-type2 --period 2026-Q1
# Generates:
# - Control narrative document (markdown)
# - Evidence inventory (CSV)
# - Proof chain export (JSON)
# - Test results summary (JSON)
# - Trust score history for all agents (JSON)
NIST AI RMF Self-Assessment
pnpm compliance:report --template nist-ai-rmf
# Generates per-function coverage reports:
# - GOVERN: 10 controls, 10 implemented
# - MAP: 7 controls, 6 implemented, 1 partial
# - MEASURE: 7 controls, 7 implemented
# - MANAGE: 7 controls, 5 implemented, 2 partial
EU AI Act Conformity Assessment
pnpm compliance:report --template eu-ai-act
# Maps trust tiers to EU risk levels
# Generates Article-by-Article evidence references
# Includes conformity assessment readiness score
Continuous Compliance Monitoring
Rather than periodic compliance checks, wire compliance monitoring into your CI/CD pipeline.
CI Integration
# .github/workflows/compliance.yml
name: Compliance Gate
on:
push:
branches: [main]
schedule:
- cron: '0 6 * * 1' # Weekly Monday 6am
jobs:
compliance:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- run: pnpm install
- run: pnpm compliance:collect
- run: pnpm compliance:assess
- run: |
# Fail if any HIGH/CRITICAL findings
jq '.findings[] | select(.severity == "HIGH" or .severity == "CRITICAL")' \
compliance/oscal/assessment-results-*.json | \
if [ -s /dev/stdin ]; then exit 1; fi
Dashboard Integration
Compliance metrics are exposed via Prometheus:
# Trust compliance metrics
vorion_compliance_controls_total{status="implemented"} 47
vorion_compliance_controls_total{status="partial"} 5
vorion_compliance_controls_total{status="planned"} 3
# Evidence freshness
vorion_compliance_evidence_age_seconds{type="npm-audit"} 3600
vorion_compliance_evidence_age_seconds{type="proof-chain"} 86400
# Assessment results
vorion_compliance_findings_total{severity="HIGH"} 0
vorion_compliance_findings_total{severity="MEDIUM"} 2
Evidence Chain of Custody
For auditors who need to verify evidence integrity:
- Evidence collection is logged to the Proof Plane as a
COMPLIANCE_EVIDENCE_COLLECTEDevent - Evidence files include SHA-256 hashes in their metadata
- OSCAL documents are signed with the platform's Ed25519 key
- Audit trail links each evidence artifact to the pipeline run that generated it
// Verify evidence integrity
import { verifyEvidenceIntegrity } from '@vorionsys/compliance';
const result = await verifyEvidenceIntegrity('compliance/evidence/');
// result.files: number of evidence files checked
// result.valid: number with matching hashes
// result.tampered: number with hash mismatches
// result.missing: number referenced but not found
Recommended Actions
- Set up weekly evidence collection via the CI schedule trigger
- Generate OSCAL SSP and commit to version control for auditability
- Wire compliance metrics into your observability dashboard
- Run quarterly assessments and compare against previous quarters
- Export proof chain before any system migration or major upgrade
Next Steps
- NIST AI RMF Mapping -- Framework alignment details
- SP 800-53 Coverage -- Control-level implementation status
- Circuit Breakers in Depth -- How enforcement decisions are made