Back to Spine

Regulatory Alignment

How Spine supports EU compliance frameworks through cryptographic audit integrity.

Important: Spine supports compliance. It is not a legal compliance authority. This page describes technical alignment, not legal certification.

Our Approach

Spine is infrastructure. It does not "certify compliance" — it enables verifiable evidence. Organizations use Spine to create tamper-evident audit trails that can be independently verified by auditors, regulators, and forensic investigators.

Frameworks Supported

DORA

Digital Operational Resilience Act

Financial Services
RequirementSpine Capability
Tamper-evident audit trailsHash-chained WAL + Ed25519 signatures
External audit verificationOffline CLI verification tool
Incident evidence retentionRetention engine + sealed archives
ICT risk documentationForensic WAL with extended metadata

NIS2 Directive

Network and Information Security

Critical Infrastructure
RequirementSpine Capability
Security incident logging (Art. 21)Immutable event capture with timestamps
Demonstrable security measuresCryptographic proof of log integrity
Incident response documentationSealed batch receipts + Merkle proofs

GDPR

General Data Protection Regulation

Data Protection
RequirementSpine Capability
Data integrity (Art. 5)BLAKE3 hash chain ensures no silent modifications
Security of processing (Art. 32)Append-only storage, cryptographic sealing
Breach notification evidenceTimestamped, signed incident records

MiCA

Markets in Crypto-Assets Regulation

Crypto Assets
RequirementSpine Capability
Order book integrityImmutable transaction logging
Transaction record retentionConfigurable retention with WORM support
Forensic-ready evidenceCourt-admissible audit trails

EU AI Act

Artificial Intelligence Act

AI Systems
RequirementSpine Capability
Automatic logging (Art. 12)Native AIEvent type with decision metadata
Human oversight records (Art. 14)HumanOversight events with approval tracking
Input data traceabilityInputReference linking to source data
Audit trail for high-risk AIComplete decision chain with Merkle proofs

External Audit Model

No platform trust required. Auditors verify cryptographic proofs, not vendor claims.

Unlike traditional logging systems where auditors must trust the platform's integrity, Spine provides independent verification. Auditors receive data exports and use our open-source CLI to cryptographically validate every hash and signature.

1

Export

Request audit data for specific time range

2

Transfer

Receive sealed data package offline

3

Verify

Run CLI tool to validate all proofs

4

Report

Generate verification report

What Spine is NOT

Not a Certification Body

We provide infrastructure, not compliance certifications or legal opinions.

Not Legal Advice

Consult your legal and compliance teams for regulatory interpretation.

Not a Replacement

Spine complements, not replaces, your existing compliance officers and processes.

Need Detailed Mapping?

We provide comprehensive article-by-article compliance mapping documents for qualified prospects during the evaluation process.

Request Detailed Documentation

Disclaimer: This page describes technical capabilities and their alignment with regulatory requirements. It does not constitute legal advice or compliance certification. Organizations are responsible for their own compliance assessments. Spine is a technical tool that supports compliance efforts but does not guarantee regulatory compliance. Consult qualified legal and compliance professionals for specific guidance.