Evidence Model
AKIOS Pro structures compliance evidence into four layers: traces, findings, control mappings, and export bundles. Each layer is independently reviewable and auditable.
Pipeline Overview#
1. Traces#
A trace is a chronological record of material AI activity. Every event — LLM call, tool invocation, policy evaluation, human review — is captured with full context for reconstruction.
Session identity
User, agent, deployment, and correlation IDs that let auditors reconstruct the full context across systems. Every trace belongs to exactly one session.
Timeline
Events are timestamped with nanosecond precision. Types: llm_call, tool_invocation, policy_evaluation, pii_detection, review_action, system_event.
Model context
Model name, system prompt, input/output tokens, temperature, top_p, max_tokens, stop sequences, and response metadata. Captures the exact inference parameters that affected behavior.
Tool activity
Tool name, input arguments, output/result, latency (ms), token cost ($), policy decision (allow/deny/escalate), and correlation to parent event.
Trace JSON structure
2. Findings#
A finding is a structured observation derived from trace data. Each finding has a type, severity, confidence, and lifecycle state. Findings are more useful than raw logs because each one can be owned, reviewed, remediated, and mapped to a compliance control.
PII Exposure
Detected sensitive data in prompts, tool inputs, or LLM responses. Classified by type (SSN, credit card, email, health data) and confidence level (0.0–1.0). Includes the matched context and character offset.
Policy Violation
Agent action that violated a defined policy: blocked tool access, disallowed domain, cost threshold exceeded, unauthorized data access. Includes the policy rule matched and the action taken (deny, warn, escalate).
Review Required
High-risk action requiring human approval. Tracks escalation path, reviewer assignment, review decision, and time-to-review. Escalated automatically if review SLA is exceeded.
Cost Anomaly
Per-agent or per-session token spend exceeds configured threshold. Includes the threshold, actual spend, time window, and correlated agent/session context.
Loop Detection
Agent entered a behavioral loop: repeated tool calls with identical inputs or outputs exceeding the configured retry limit. Includes the loop pattern detected and termination action.
Missing Review
A high-risk action required human approval but was not reviewed within the required window. Escalated for compliance review with full audit trail.
Finding lifecycle
Each finding progresses through: open → reviewing → remediated → closed. Status transitions are recorded with actor, timestamp, and comment. Auditors can verify that every finding was handled to completion. Findings can be reopened if remediation is incomplete.
3. Control Mapping#
Traces and findings are mapped to compliance controls. This lets legal, security, and compliance teams verify that specific regulatory obligations are met without reading raw technical records. Mappings are configurable per organization and per framework.
4. Export Bundles#
An export bundle packages traces, findings, control mappings, and retention proof into a single deliverable. Bundles are the primary artifact for audit requests, security reviews, procurement files, and regulator responses.
Formats
JSON for programmatic ingestion. HTML with navigation for human review. PDF with cover page and table of contents for regulator submission. Parquet for data warehouse import.
Scope selection
Filter by time range, agent, user, finding type, control framework, severity level, or session ID. Combine filters for precise audit packages.
Retention proof
Each export includes SHA-256 hashes of all records and a signed attestation that records have not been modified since capture. Usable as evidence of data integrity.
SIEM forwarding
Configure continuous forwarding to Splunk HEC, Microsoft Sentinel, or generic syslog. Events are structured with consistent schema for correlation.