ZAAP · Security & Compliance · v1.0
Three guards.One ledger.
Source documents stay inside the enclave. Hallucinated fields are rejected at the boundary. Every approval, gate, and incident writes to a WORM ledger that a regulator can verify.
GUARD 01 — AIR-GAPPED OCR
Air-Gapped OCR.
Source documents never leave the enclave.
Policy PDFs, SOPs, and event-log extracts are parsed inside the customer enclave. No document bytes, no embeddings, and no model prompts ever cross the network boundary. ZAAP returns structured fields — never the raw source.
- 01On-prem OCR runtime; no external model calls during extraction
- 02Per-document sha256 captured at ingress and pinned to the audit ledger
- 03Field-level redaction for PII, PHI, and CJI before any downstream use
- 04Egress allowlist enforced at the network layer, not just in code
Diagram
- Source docPDF / SOP
- Enclave OCRon-prem
- RedactPII · PHI · CJI
- Structured fieldsout
- 01
Source doc
PDF / SOP
- 02
Enclave OCR
on-prem
- 03
Redact
PII · PHI · CJI
- 04
Structured fields
out
Bytes stay in. Fields come out.
GUARD 02 — PYDANTIC LOCK
Pydantic Lock.
Hallucinated fields are rejected at the boundary.
Every model output crosses a strongly-typed Pydantic schema before it enters the system. Unknown keys, malformed enums, and out-of-range numerics are rejected at the boundary with a recorded violation — not silently coerced into the database.
- 01Strict schema on every model output; unknown keys cause rejection
- 02Enums resolve against the LookupTable registry — never free text
- 03Numeric fields enforce min/max and unit; currency carries ISO 4217 code
- 04Every reject writes a typed violation to the audit ledger with the raw payload hash
Diagram
- Model outputJSON
- Schema checkPydantic
- Lookup resolveenum · unit
- Accepted recordor rejected
- 01
Model output
JSON
- 02
Schema check
Pydantic
- 03
Lookup resolve
enum · unit
- 04
Accepted record
or rejected
No silent coercion. No surprise enums.
GUARD 03 — WORM AUDIT LEDGER
WORM Audit Ledger.
Every decision is append-only and addressable.
Approvals, gate outcomes, evidence uploads, ROI updates, and incident triggers are written to an append-only ledger. Each entry is content-addressed by sha256 and linked to the prior entry, producing a tamper-evident chain per initiative.
- 01Append-only writes; updates produce a new entry, never a mutation
- 02sha256 per entry; prev-hash chain per initiative; verifiable on demand
- 03Linked artifacts (evidence, decisions, gate outcomes) carry their own hashes
- 04Re-Review Triggers and kill-switch events are first-class ledger entries
Diagram
- Decisiongate · evidence
- Hashsha256
- Chainprev-hash
- WORM ledgerappend-only
- 01
Decision
gate · evidence
- 02
Hash
sha256
- 03
Chain
prev-hash
- 04
WORM ledger
append-only
What got approved. By whom. With what evidence. When.
04 — Compliance Surface
Frameworks ZAAP is built to satisfy.
Listed via the complianceFrameworks lookup. Tenants add frameworks; the grid follows.