Skip to main content
SINT Protocol is designed to map cleanly to the three compliance frameworks that will matter for high-risk AI deployments in 2026 and beyond. The tier crosswalk is machine-readable at GET /v1/compliance/tier-crosswalk.
EU AI Act high-risk provisions take effect 2 August 2026. Article 13 (transparency) and Article 14 (human oversight) are the two most directly addressed by SINT. Penalties reach €35M or 7% of global annual turnover.

IEC 62443 — FR1 through FR7

IEC 62443 is the canonical industrial-control-systems security series. IEC PAS 62443-1-6:2025 (published December 2025) extends it to Industrial IoT, which is where physical AI lives.
FRRequirementSINT mechanism
FR1Identification & AuthenticationSintCapabilityToken with Ed25519 identity; W3C DID portability; challenge-response in PENDING_AUTH.
FR2Use ControlFour-tier gate (T0–T3); scope.allowedTools allowlists; per-resource action restrictions.
FR3System IntegritySHA-256 hash-chained Evidence Ledger; ProofReceipt with TEE attestation for T2/T3.
FR4Data ConfidentialityTLS 1.3 on all inter-component traffic; scoped tokens prevent sensor access without explicit grant.
FR5Restricted Data FlowPolicy Gateway allowlists; geofence constraint; per-topic SINT Bridge DFA.
FR6Timely Response to Eventssafety.estop.triggered event; E-stop universality (I-G2); T0 p50 ≤ 1ms.
FR7Resource AvailabilityPer-token rate limiting; maxRepetitions constraint; budget enforcement in capsule sandbox.

EU AI Act — Article 13 and Article 14

Verifiable transparency, not claimed transparency. The industry status quo is application-layer logs that are deletable, editable, and whose integrity rests on operational discipline. SINT’s Evidence Ledger moves transparency from claimed to verifiable: append-only, SHA-256 hash-chained, TEE-signed per event, with deletion detectable by external audit.
RequirementIndustry status quoSINT implementation
Art. 13 log keeping for high-risk AIApplication logs, deletableAppend-only ledger, SHA-256 chain, deletion detectable
Art. 13 decision traceabilityHuman-readable audit trailsMachine-verifiable decisionRef linkage; TEE signature per event
Art. 14 human oversight”Human in the loop” as policy statementFormal T3 state; ESCALATING → HUMAN_APPROVED/DENIED/TIMEOUT
Art. 14(4)(e) override mechanismKill switch procedureCircuitBreaker.trip() with I-G2 universality; manual reset required
Art. 17 quality managementQMS documentation157-test conformance suite; AUDIT_CHAIN_VERIFIED triggers external audit
Art. 9 risk managementRisk registersTier escalation function operationalizes continuous risk assessment

NIST AI RMF

NIST’s AI Risk Management Framework organizes risk into four functions: GOVERN, MAP, MEASURE, MANAGE.
FunctionNIST controlSINT mechanism
GOVERNGOVERN-1.1 (human oversight policies)T2/T3 escalation; CircuitBreaker
GOVERNGOVERN-1.2 (risk tolerance)Per-deployment SintDeploymentProfile
GOVERNGOVERN-4.1 (accountability)EvidenceLedger hash-chained append-only
MAPMAP-1.1 (risk identification)PolicyGateway tier assignment
MAPMAP-3.5CSML risk scoring
MAPMAP-5.1 (stakeholder impact)PhysicsConstraints with velocity/force/geofence
MEASUREMEASURE-1.1 (risk measurement)CSML score
MEASUREMEASURE-2.5 (bias/fairness)Per-model CSML
MEASUREMEASURE-2.6 (monitoring)EvidenceLedger with SIEM export
MEASUREMEASURE-2.8 (operation)PolicyGateway benchmark suite
MANAGEMANAGE-1.3 (risk response)Tier escalation
MANAGEMANAGE-2.2 (treatment)Token attenuation
MANAGEMANAGE-4.2 (incident response)CircuitBreakerPlugin; forensic trail
Full mapping with sub-category evidence: docs/specs/nist-ai-rmf-crosswalk.md.

ISO/IEC 42001

SINT tierISO/IEC 42001 clause
T0 ObserveClause 9 + Clause 8 controls
T1 PrepareClause 8.1 / 8.2 operational risk treatment
T2 ActClause 8 + Clause 6 operational controls
T3 CommitClause 8.3 + Clause 10 corrective governance

OWASP Top 10 for Agentic Applications

All ten ASI categories are addressed with dedicated regression tests in the conformance suite.
CategorySINT control
ASI01 Goal HijackingGoalHijackPlugin (5-layer heuristics) + CSML drift detection
ASI02 Prompt InjectionT3 classification, token scoping
ASI03 Insecure OutputTransformation constraints
ASI04 Tool MisusePolicyGateway tier assignment
ASI05 Shell via Tool CallsT3 CRITICAL classifier
ASI06 Memory PoisoningMemoryIntegrityChecker
ASI07 Excessive AutonomyT2 escalation threshold
ASI08 Inadequate LoggingEvidenceLedger mandatory recording
ASI09 Supply ChainCapabilityToken chain validation
ASI10 Rogue AgentCircuitBreakerPlugin (EU AI Act stop button)

Machine-readable crosswalk

curl https://api.sint.gg/v1/compliance/tier-crosswalk
Returns the full mapping as JSON for integration into compliance automation tools.
Preparing for a compliance audit? The conformance suite generates a per-invariant certification bundle that auditors can ingest directly. See docs/reports/certification-bundle-summary.md in the repo.