AI System Compliance Card · Authority Finality at-a-glance

The nutrition label for AI systems.

A KYE Compliance Card is a public-key-verifiable, machine-readable, human-readable summary of any AI system: its KYE bindings, the frameworks it satisfies, the freshness of its signed evidence, its recovery posture, and the date of its last attestation. One artefact, every audience — risk committees, EU AI Act notified bodies, SOC 2 auditors, customers, your own engineers.

Example card · Compliance Map projection

What an AI System Compliance Card looks like.

KYE Compliance Card · v1.0

Acme Treasury FX Router

kye:agent:acme.eu:treasury:fx-router
Signed · 2026-05-04 14:22 UTC Issuer: kye:trust:acme.eu

Identity

Class
AI agent
Model family
Treasury-LLM-v3
Version
3.2.1 (signed)
Trust domain
acme.eu

Authority

Delegation chain
CFO → Regional Treasurer → Agent
Capability profile
kye-payments-1.0
Scope
USD ≤ $5M / EU + US corridors
Authority freshness
4 min ago

Frameworks satisfied

  • PSD3 12 / 12 controls
  • DORA 18 / 18 controls
  • EU AI Act 10 / 10 high-risk Title III
  • ISO 27001 47 / 47 Annex A
  • SOC 2 64 / 64 TSC

Evidence freshness

  • Audit chain96%
  • Self-audit88%
  • Replay test100%
  • Signal-bus uptime99.94%

Recovery posture

Cascade revoke
< 1 second (tested 2026-05-03)
Break-glass profile
kye-recovery-1.0
Open recoveries
0
Last fire-drill
2026-04-22

Attestation

Conformance level
L3 KYE Conformant
Self-Attested
2026-05-04
Self-Tested
41 / 41 fixtures pass
Public key
ed25519:7f3a…e2c8

This Compliance Card is a Compliance Map projection produced from the KYE audit chain. Verify the signature against the Issuer’s published key. KYE produces evidence; certifications remain the customer’s.

Who reads this card

One artefact, every audience.

business_centerRisk committeeThe board sees a single freshness number per AI system, not a 200-page deck.
verified_userAuditor · 3PAOCross-references KYE bindings to OSCAL assessment-results and to the framework controls in scope.
gavelRegulator · notified bodyEU AI Act Title III high-risk technical documentation extracts straight from the card’s framework section.
groupsCustomer / partnerProcurement security review answered by URL: send the card link, not a 90-question questionnaire.
codeInternal engineeringEvery PR can re-run the card; freshness regressions become a CI signal.
policyLegal / privacyGDPR Art. 30 records-of-processing artefact links straight to capability + evidence-pack URNs.
Schema · URN

Card is a first-class KYE object.

  • URN kye:card:<trust-domain>:<subject-class>:<subject-local>:<version> — e.g. kye:card:acme.eu:agent:fx-router:v3.2.1.
  • Schema https://kyeprotocol.com/schemas/compliance-card.v1.json — JSON Schema 2020-12 draft. Card payload is signed by the issuer’s Ed25519 key.
  • Endpoint GET /v1/cards/{urn} · POST /v1/cards/{urn}/refresh regenerates from the latest audit chain.
  • Render Public-shareable HTML render at https://<trust-domain>/.well-known/kye/cards/<urn> — renderer ships with v1.1.
  • Cross-walk Card ⇄ OSCAL component-definition mapping: every Compliance Card has a deterministic OSCAL projection (see OSCAL compatibility).
Where to go next

Adjacent reading.

Ready to see your AI agents flagged?

Start in shadow mode. We’ll deliver your first Evidence Pack in 4–8 weeks.