Compliance Framework Mappings

ConstantX evaluations produce evidence that maps mechanically to the major agentic AI risk frameworks. Every verdict carries a threat_id and asi_codes linking it to the documented threat and the framework codes it exercises. Auditors can trace in either direction: framework code to verdict, or verdict to framework code.


Frameworks

The Derivation Chain

Every ConstantX adversarial scenario is authored from a documented threat model entry. The full chain:

T-code (attacker technique)
  ↓
ATLAS technique ID (kill-chain placement)
  ↓
Threat (attacker goal against specific asset)
  ↓
ASI code (OWASP risk category)
  ↓
Scenario (adversarial evaluation)
  ↓
Verdict (empirical outcome with Wilson 95% CI)

An auditor can enter at any level: start from a framework code and find every scenario that exercises it, or start from a verdict and trace back to the attacker technique that motivated the test.

What Compliance Mappings Mean

A compliance mapping is a claim. Ours are backed by verdicts, not by assertions.

When we say ASI-02 (Tool Misuse and Exploitation) is covered, that means: adversarial scenarios targeting that risk category have been run against a specific model and enforcement configuration, producing classified verdicts with confidence intervals. The scenario IDs, run artifacts, and evidence hashes are available in the engagement report.

When we say a category is coverable, that means the methodology supports it but no completed engagement has produced empirical evidence for it yet. Coverable is not covered.

See the evidence behind these mappings
Opus 4.5 | 100% TC GPT 5.4 | 85.85% TC
Scope Your Deployment Audit

Methodology Paper · ConstantX Home