Compliance Framework

Control mappings, audit procedures, and regulatory alignment

Executive Summary

RayRay is architected for deployment in controlled unclassified environments (CUI) with alignment to FedRAMP authorization boundaries. The system implements a compliance-first approach where AI-assisted operations maintain human oversight as mandated by OMB M-25-21 ("Advancing Governance, Innovation, and Risk Management for Agency Use of AI").

Applicable Frameworks

FrameworkAuthorityApplicability
OMB M-25-21Office of Management and BudgetMandatory for Federal AI systems
NIST 800-53 Rev 5NISTSecurity and privacy controls
FedRAMPGSACloud service authorization
FISMADHSInformation security management
NIST AI RMFNISTAI risk management

Control Family Mappings

Access Control (AC)

ControlImplementationEvidence
AC-2 Account ManagementRole-based accounts with email-based identificationUser audit table, role assignments
AC-3 Access EnforcementFour-tier role model (Observer, Analyst, Reviewer, Admin)JWT role claims, endpoint guards
AC-6 Least PrivilegeRole permissions enforced at API layerPermission matrix documentation

Identification and Authentication (IA)

ControlImplementationEvidence
IA-2 Identification and AuthenticationOAuth 2.0 password grant with JWT tokensAuth service logs, token issuance records
IA-2(1) Multi-Factor AuthenticationTOTP-based MFA (RFC 6238 compliant)MFA enrollment logs, challenge records
IA-5 Authenticator Managementbcrypt password hashing, TOTP secrets encryptedPassword policy enforcement logs

Audit and Accountability (AU)

ControlImplementationEvidence
AU-2 Audit EventsComprehensive event logging for all CUD operationsEvent type enumeration in codebase
AU-3 Content of Audit RecordsTimestamp, user ID, IP, resource type, action, outcomeJSON Lines format specification
AU-4 Audit Storage CapacityDaily log rotation with configurable retentionStorage configuration documentation
AU-9 Protection of Audit InformationSHA-256 hash chain prevents tamperingHash verification API endpoint
AU-11 Audit Record RetentionConfigurable retention period (default: 7 years)Retention policy configuration

OMB M-25-21 Alignment

OMB M-25-21 mandates that agencies ensure human oversight of AI systems that could impact rights or safety. RayRay implements the following safeguards:

Required: Human-in-the-Loop (HITL)

┌─────────────────┐
│   AI Extraction │
└────────┬────────┘
         │
         ▼
┌─────────────────┐
│ Redundancy Check│  ◀── Quality validation
└────────┬────────┘
         │
         ▼
┌─────────────────┐
│  CHECKPOINT     │  ◀── M-25-21 MANDATORY
│  Human Review   │      Human must approve
└────────┬────────┘      before ANY commit
         │
    ┌────┴────┐
    ▼         ▼
┌───────┐ ┌───────┐
│Commit │ │Reject │
└───────┘ └───────┘

Key compliance point: The LangGraph workflow enforces a hard checkpoint at the human review stage. No database write occurs without explicit human action. This satisfies M-25-21's requirement for "meaningful human oversight" of AI outputs.

AI Transparency Requirements

RequirementImplementation
AI-generated content identificationAll extractions marked with AI model, provider, and confidence score
Human modification trackingOriginal AI values preserved when human edits occur
Review audit trailReviewer ID, timestamp, and decision recorded for every commit

Audit Log Architecture

Hash Chain Integrity

Each audit event includes a SHA-256 hash computed over the event content plus the previous event's hash. This creates a blockchain-style integrity chain where tampering with any historical event breaks the chain.

// Event structure
{
  "_id": "evt_abc123",
  "_timestamp": "2026-03-12T15:30:00Z",
  "_prev_hash": "sha256:7f8a...",
  "_hash": "sha256:3b2c...",
  "event_type": "review_approve",
  "user_id": 42,
  "resource_type": "extraction",
  "resource_id": 123,
  "outcome": "success"
}

// Integrity verification
GET /api/audit/verify
{
  "valid": true,
  "events_checked": 1847,
  "first_failure": null,
  "errors": []
}

Event Types

Event TypeDescriptionNIST Control
document_uploadDocument submitted for processingAU-2
extraction_startAI extraction initiatedAU-2
extraction_completeAI extraction finished with confidence scoresAU-2
review_approveHuman approved AI extractionsAU-2, M-25-21
review_modifyHuman modified AI extractionsAU-2, M-25-21
review_rejectHuman rejected AI extractionsAU-2, M-25-21
export_downloadReport exported (PPTX, PDF)AU-2

Role-Based Access Control

RayRay implements a four-tier role model aligned with separation of duties principles:

RolePermissionsTypical Assignment
ObserverRead-only access to documents and extractionsStakeholders, Auditors
AnalystUpload documents, review drafts, mark for approvalData entry staff, Junior analysts
ReviewerApprove/reject extractions, commit to databaseSenior analysts, Supervisors
AdminFull system access, user management, configurationSystem administrators, ISSOs

Separation of Duties

M-25-21 Control: The system enforces that analysts cannot commit AI extractions to the database — only reviewers and admins hold commit authority. This prevents single points of failure and ensures appropriate oversight.

// Permission matrix
┌─────────────┬─────────┬─────────┬──────────┬────────┐
│  Action     │Observer │ Analyst │ Reviewer │ Admin  │
├─────────────┼─────────┼─────────┼──────────┼────────┤
│ View        │    ✓    │    ✓    │    ✓     │   ✓    │
│ Upload      │    ✗    │    ✓    │    ✓     │   ✓    │
│ Edit Draft  │    ✗    │    ✓    │    ✓     │   ✓    │
│ Commit      │    ✗    │    ✗    │    ✓     │   ✓    │
│ User Mgmt   │    ✗    │    ✗    │    ✗     │   ✓    │
└─────────────┴─────────┴─────────┴──────────┴────────┘

Related Documentation