Overview
Continum helps you demonstrate compliance with major regulatory frameworks by automatically mapping your monitoring signals to specific regulatory requirements. This documentation explains how Continum supports each framework.Supported Frameworks
GDPR (General Data Protection Regulation)
The EU’s comprehensive data protection regulation.Key Requirements Monitored
Article 25 - Data Protection by Design- Continum’s Guardian detects PII before it reaches LLMs
- Automatic redaction of personal data
- Privacy-by-default monitoring
- Continuous security monitoring
- Detection of data breaches
- Cryptographic integrity verification
- Risk level assessment for all interactions
- Automated impact analysis
- Compliance evidence generation
Continum Coverage
- Which GDPR articles are actively monitored
- Coverage percentage
- Recommended monitoring configurations
SOC 2 (Service Organization Control 2)
Trust Services Criteria for service providers.Key Requirements Monitored
CC6.1 - Logical and Physical Access Controls- Monitoring of unauthorized access attempts
- Detection of privilege escalation
- Access pattern analysis
- Continuous monitoring of all AI interactions
- Real-time violation detection
- Incident tracking and resolution
- Monitoring of system behavior changes
- Detection of unexpected outputs
- Configuration drift detection
Continum Coverage
Continum provides evidence for SOC 2 Type II audits:- Continuous monitoring over audit period
- Incident response documentation
- Cryptographic audit trails
- Coverage analysis reports
ISO 27001 (Information Security Management)
International standard for information security.Key Requirements Monitored
A.12.6.1 - Technical Vulnerability Management- Detection of security vulnerabilities in outputs
- Code injection monitoring
- Secret leak detection
- Security-by-design monitoring
- Threat detection in AI outputs
- Security policy enforcement
- Automated risk assessment
- Incident classification
- Impact analysis
Continum Coverage
ISO 27001 certification support:- Continuous security monitoring
- Vulnerability detection
- Incident management
- Evidence packages for auditors
HIPAA (Health Insurance Portability and Accountability Act)
US healthcare data protection regulation.Key Requirements Monitored
§164.308 - Administrative Safeguards- Access controls and monitoring
- Incident response procedures
- Security awareness and training evidence
- Audit controls and logging
- Integrity verification
- Transmission security monitoring
- Complaint and sanction tracking
- Mitigation documentation
- Compliance evidence
Continum Coverage
HIPAA compliance support:- PHI detection and protection
- Audit trail generation
- Incident documentation
- Business Associate Agreement (BAA) support
CCPA (California Consumer Privacy Act)
California’s consumer privacy law.Key Requirements Monitored
Right to Know- Tracking of personal information processing
- Data collection monitoring
- Purpose limitation verification
- Data retention policy enforcement
- Deletion verification
- Retention compliance
- Consent verification
- Opt-out compliance monitoring
- Data sharing detection
EU AI Act
European Union’s AI regulation.Key Requirements Monitored
High-Risk AI Systems- Bias detection and monitoring
- Transparency requirements
- Human oversight verification
- Manipulation detection
- Subliminal techniques monitoring
- Social scoring prevention
- AI interaction disclosure
- Deepfake detection
- Automated decision documentation
PCI DSS (Payment Card Industry Data Security Standard)
Security standard for payment card processing.Key Requirements Monitored
Requirement 3 - Protect Stored Cardholder Data- Credit card number detection
- CVV detection
- Cardholder data protection
- Comprehensive audit logging
- Access monitoring
- Incident tracking
- Continuous security testing
- Vulnerability detection
- Security monitoring
Framework Comparison
| Framework | Focus | Continum Support | Evidence Package |
|---|---|---|---|
| GDPR | Data Protection | Full | ✅ |
| SOC 2 | Trust Services | Full | ✅ |
| ISO 27001 | Information Security | Full | ✅ |
| HIPAA | Healthcare Data | Full | ✅ |
| CCPA | Consumer Privacy | Full | ✅ |
| EU AI Act | AI Regulation | Full | ✅ |
| PCI DSS | Payment Security | Full | ✅ |
Using Framework Attestations
View Attestations
See how your signals map to regulatory requirements:Coverage Analysis
Understand your compliance coverage:Evidence Package Generation
Generate framework-specific evidence packages:- Executive summary
- Requirement coverage analysis
- Compliance attestations
- Incident reports
- Hash chain verification
- Recommendations
Multi-Framework Compliance
Monitor multiple frameworks simultaneously:Compliance Policies
Define policies based on regulatory requirements:Auditor Access
Grant framework-specific access to auditors:Best Practices
Framework Selection
Choose frameworks based on your business:- SaaS Companies: SOC 2, GDPR, ISO 27001
- Healthcare: HIPAA, GDPR, ISO 27001
- E-commerce: PCI DSS, GDPR, CCPA
- Financial Services: SOC 2, ISO 27001, PCI DSS
- EU Operations: GDPR, EU AI Act, ISO 27001
Coverage Monitoring
Monitor compliance coverage regularly:- Review coverage reports monthly
- Address gaps in monitoring
- Update sandbox configurations
- Validate regulatory mappings
Evidence Generation
Generate evidence packages:- Quarterly for internal reviews
- Annually for compliance audits
- On-demand for regulatory submissions
- Before certification assessments
Continuous Compliance
Maintain continuous compliance:- Real-time monitoring
- Automated attestations
- Incident tracking
- Regular verification
Compliance Roadmap
Continum’s compliance support roadmap:Current Support
- GDPR (Full)
- SOC 2 (Full)
- ISO 27001 (Full)
- HIPAA (Full)
- CCPA (Full)
- EU AI Act (Full)
- PCI DSS (Full)
Coming Soon
- NIST Cybersecurity Framework
- FedRAMP
- CMMC (Cybersecurity Maturity Model Certification)
- PIPEDA (Canada)
- LGPD (Brazil)
Next Steps
Evidence
Learn about compliance evidence
Attestations API
Attestations API documentation
Evidence Packages
Generate audit reports
Dashboard
View compliance in dashboard

