Compliance Mapping Guide
This guide covers how to map your TealTiger policies to regulatory and security compliance frameworks — how to track coverage, identify gaps, generate reports, and create custom frameworks for your organization’s needs.Compliance features require authentication and a team workspace. See the Getting Started Guide for setup.
Supported Frameworks
The playground ships with five built-in compliance frameworks:| Framework | ID | Version | Controls | Focus Area |
|---|---|---|---|---|
| OWASP Top 10 for Agentic Applications | owasp-asi-2024 | 1.0 | 10 | AI/LLM security risks |
| NIST AI Risk Management Framework | nist-ai-rmf-1.0 | 1.0 | 8 | AI risk governance |
| SOC2 Type II | soc2-type-ii | 2017 | 8 | Security and availability |
| ISO 27001:2022 | iso-27001-2022 | 2022 | 8 | Information security management |
| GDPR | gdpr-2018 | 2018 | 8 | Data protection and privacy |
OWASP Top 10 for Agentic Applications (ASI 2024)
| Code | Title | Category |
|---|---|---|
| ASI01 | Prompt Injection | Input Security |
| ASI02 | Sensitive Information Disclosure | Data Protection |
| ASI03 | Supply Chain Vulnerabilities | Supply Chain |
| ASI04 | Data and Model Poisoning | Model Security |
| ASI05 | Improper Output Handling | Output Security |
| ASI06 | Excessive Agency | Access Control |
| ASI07 | System Prompt Leakage | Configuration Security |
| ASI08 | Vector and Embedding Weaknesses | RAG Security |
| ASI09 | Misinformation | Content Quality |
| ASI10 | Unbounded Consumption | Resource Management |
Mapping Policies to Frameworks
How to Map a Policy
- Open a policy in your workspace
- Click the “Compliance” tab
- Select a framework from the Framework Selector dropdown
- Find the requirement and click “Map”
- Add a note explaining how the policy addresses the requirement
- Click Save
Mapping Rules
- A single policy can be mapped to multiple requirements across different frameworks
- Multiple policies can be mapped to the same requirement (shared coverage)
- Duplicate mappings (same policy + same requirement) are rejected automatically
- Mappings can be removed at any time; removal is logged in the audit trail
Coverage Tracking
Navigate to the Compliance Dashboard from the sidebar to see:- Coverage percentage per framework —
(mapped requirements / total requirements) × 100 - Mapped vs. unmapped requirement counts
- Unmapped requirements highlighted for gap identification
Generating Compliance Reports
Generating a Report
- Open the Compliance Dashboard
- Click “Generate Report”
- Select a framework (or generate for all)
- Optionally filter by date range or policy state
- Click Generate
What’s in a Report
| Section | Contents |
|---|---|
| Executive Summary | Total policies, mapped policies, coverage percentage, average test coverage |
| Policy Details | Each policy with version, author, approval status, mapped requirements |
| Test Coverage | Test coverage metrics per policy |
| Audit Summary | Total changes, approvals, deployments; recent audit events |
Export Formats
- PDF — formatted report with optional organization branding (name, logo, colors, footer)
- CSV — tabular data for spreadsheet analysis
Creating Custom Frameworks
Define a custom framework using JSON:Loading a Custom Framework
- Open the Compliance Dashboard
- Click “Add Custom Framework”
- Paste or upload your JSON definition
- Click Load Framework
Compliance Examples
Example: Mapping a PII Detection Policy to OWASP ASI02
- Open your
pii-detectionpolicy → Compliance tab - Select OWASP ASI 2024
- Map to ASI02 — Sensitive Information Disclosure
- Note: “Detects and redacts PII patterns in LLM outputs including emails, phone numbers, and SSNs”
Example: Cross-Framework Mapping
A budget enforcement policy can map to controls across several frameworks:| Framework | Control | Mapping Note |
|---|---|---|
| OWASP ASI 2024 | ASI10 — Unbounded Consumption | ”Enforces per-request cost limits and daily budget caps” |
| NIST AI RMF | MANAGE-1.1 — Risk Response | ”Implements automated cost risk response” |
| SOC2 Type II | A1.2 — Availability Monitoring | ”Monitors API cost and usage in real-time” |
Best Practices
- Start with OWASP ASI — most directly relevant for AI/LLM security policies
- Map as you build — add compliance mappings when you create or update a policy
- Write meaningful notes — explain specifically how the policy addresses the requirement
- Aim for 100% on your primary framework — identify gaps early
- Generate reports monthly — maintain a consistent compliance paper trail
- Export as PDF for auditors — include your organization’s branding
Related Guides
- Getting Started — Sign in, create workspaces, write your first policy
- Governance Workflow — Approval processes, emergency bypass, impact analysis
- Audit Trail — Immutable logging, filtering, and export
- CI/CD Integration — Automated policy testing with GitHub Actions

