Skip to content

Compliance Reporting

Auditors want evidence. Security teams want findings. Firmis gives you both in one pass. Every scan finding maps automatically to the compliance controls it violates — and every clean check maps to the controls it satisfies. One scan. Five frameworks. Done.

Firmis maps findings to five compliance and regulatory frameworks:

FrameworkFocusWho needs it
SOC 2 Type IISecurity, availability, confidentiality controlsSaaS companies, B2B vendors
EU AI ActRisk management, transparency, human oversight for AI systemsCompanies deploying AI in the EU
GDPRPersonal data protection, breach notificationCompanies handling EU personal data
NIST AI RMFAI risk identification, measurement, managementUS federal agencies, enterprises
OWASP LLM Top 10LLM-specific application securityAI/ML engineering teams

Every Firmis detection rule is tagged with the compliance controls it provides evidence for. When a finding is detected, Firmis records it as evidence of a control gap. When a check passes (no finding), it records it as evidence of control adherence.

Scan finding: tp-001 Hidden Instructions in Tool Description
Compliance mapping:
SOC 2 → CC6.1 (Logical Access Controls)
EU AI Act → Art. 9 (Risk Management System)
NIST AI RMF → GOVERN 1.1 (Policies and Procedures)
OWASP LLM → LLM01 (Prompt Injection)

The compliance report aggregates all findings and generates:

  1. A control-by-control status table (pass / fail / not-applicable)
  2. Evidence citations linking each control status to specific scan findings or clean checks
  3. Remediation priority order ranked by compliance impact

Generate an HTML compliance report for the EU AI Act:

Terminal
firmis compliance --framework ai-act --output report.html

Generate reports for multiple frameworks at once:

Terminal
firmis compliance --framework soc2,ai-act,gdpr --output ./compliance-reports/

Generate a machine-readable JSON report for integration with GRC tools:

Terminal
firmis compliance --framework nist-ai-rmf --format json --output nist-report.json

Include compliance reporting in your CI pipeline:

Terminal
firmis ci --compliance soc2 --fail-on high --output ./reports/

A one-page summary with:

  • Overall compliance posture (percentage of controls passing)
  • Framework-specific risk rating
  • Top 5 control gaps by severity
  • Trend comparison if prior reports exist

A table of every control in the framework, with status and evidence:

Example — SOC 2 control matrix (excerpt)
Control Title Status Evidence
────────────────────────────────────────────────────────────────────────
CC6.1 Logical Access Controls FAIL 3 findings: sd-014,
sd-015, ac-001
CC6.2 Authentication PASS No findings in scope
CC7.1 System Monitoring PARTIAL 1 finding: cfg-002
CC8.1 Change Management PASS No findings in scope

Each control gap is accompanied by:

  • The specific Firmis finding (rule ID, file, line)
  • Plain-language explanation of the compliance relevance
  • Recommended remediation steps
  • Estimated effort to resolve (Low / Medium / High)

Findings sorted by compliance impact, with guidance on which fixes address the most framework controls simultaneously — so security work maps directly to audit evidence.

Firmis is particularly thorough on the OWASP LLM Top 10 because its rule categories map directly to LLM-specific risks:

OWASP LLM RiskFirmis Categories
LLM01 Prompt Injectionprompt-injection, tool-poisoning
LLM02 Insecure Output Handlingdata-exfiltration, suspicious-behavior
LLM03 Training Data Poisoningagent-memory-poisoning
LLM06 Sensitive Information Disclosuresecret-detection, credential-harvesting
LLM07 Insecure Plugin Designpermission-overgrant, access-control
LLM09 Overrelianceinsecure-config
LLM10 Model Theftsupply-chain, known-malicious

The EU AI Act applies to AI systems deployed in the EU. For high-risk AI systems, Firmis covers:

ArticleRequirementCovered by
Art. 9Risk management systemAll threat categories
Art. 10Training and testing data governancesupply-chain, known-malicious
Art. 12Record-keeping and loggingaccess-control, insecure-config
Art. 13Transparencytool-poisoning, prompt-injection
Art. 15Accuracy, robustness, and cybersecuritysecret-detection, data-exfiltration