Enterprise · audit pack

What your auditor actually receives.

The Enterprise tier ships a quarterly audit pack to your auditor. This page is the sample structure — the same ten sections, every quarter, with the actual evidence your auditor needs in the form they need it.

The ten sections

Auditor-shaped, not "data dump"-shaped.

Each section is a deliverable file format, not raw NDJSON the auditor has to make sense of. The "why" column maps to a specific control your auditor is checking — usually NIST AI RMF, ISO 42001, EU AI Act, or SOC 2.

01

Cover & executive summary

PDF cover page + 1-page exec summary
Contents
  • Customer org name, license_id, billing period covered
  • Quarterly window dates + total AI commits attested
  • "Posture changed since last quarter" delta (with cited rows)
  • Auditor sign-off block (your auditor signs this section, not us)
Why your auditor cares

Auditor reads this first. If the exec summary doesn't answer "is your AI governance program credible," they go deeper. If it does, the rest is supporting evidence.

02

Cryptographic posture

JSON file + verifier script + 1-page posture summary
Contents
  • Issuer pubkey fingerprint (SHA-256 of SPKI-DER)
  • Per-install identity-keypair fingerprints (every machine that ran fastpace activate in the window)
  • Audit-chain head hash + entry count per install
  • fastpace verify output for each install (chain integrity status)
  • Run-manifest signature verification rate (% of AI calls with valid signatures)
Why your auditor cares

Maps to SOC 2 CC6.1 / CC6.7 (logical access + cryptographic protections). Auditor can independently verify the chain integrity using the included script — no trust in fastpace required.

03

Framework mapping

Excel/CSV mapping matrix — control → fastpace evidence
Contents
  • NIST AI RMF (GOVERN / MAP / MEASURE / MANAGE) — 24 sub-controls mapped
  • ISO/IEC 42001 (AI management system) — 18 sub-controls mapped
  • EU AI Act high-risk-system requirements (Articles 9–17) — 11 controls mapped
  • SOC 2 Type II (CC4.1 monitoring, CC6.1 access, CC7.1 detection, CC8.1 change-management) — 14 controls mapped
  • ISO 27001 Annex A (A.5–A.8 organizational + people + physical + tech controls) — 22 controls mapped
  • Per-control: which fastpace primitive provides evidence + sample of evidence
Why your auditor cares

The single most-asked-for artifact. Customer's auditor references this matrix during fieldwork; saves ~40 hours of "show me how X maps to Y" cycles.

04

AI Bill of Materials (CycloneDX-AI)

Per-release CycloneDX-AI JSON + signed envelope
Contents
  • Every model invoked in the window (provider, family, version, runtime)
  • Per-model invocation count + total tokens
  • Provenance trailers linking each AI commit to the model that produced it
  • Sub-processor attestation (which AI provider saw what data class)
  • Air-gap status (which installs run with no outbound AI calls)
Why your auditor cares

Maps to the EU AI Act's "transparency about training and deployment data" requirements. CISO uses this for sub-processor reviews. CycloneDX-AI is the OWASP draft format — your downstream customers can verify it without bespoke tooling.

05

Run manifests + audit-chain extracts

NDJSON dump + tamper-evidence verification report
Contents
  • Every signed run manifest in the quarter (1 row per AI tool call)
  • Every audit-chain entry (1 row per significant event: tool call, agent grant, exception, hook decision)
  • Tamper-evidence: hash-chain integrity verified per install
  • Sensitivity-tag distribution (what % of AI calls saw what data class)
Why your auditor cares

Maps to SOC 2 CC4.1 (monitoring) + CC7.1 (detection of anomalies). Sensitivity tags are the CISO's answer to "did our AI agent see customer PII?"

06

Policy distribution + exception register

Signed policy bundle + exception ledger
Contents
  • Active policy bundle hash (signed by your org's key, distributed to every install)
  • Per-install policy-bundle reception confirmation (signed receipt)
  • Exception ledger: every time-boxed override granted in the window
  • Per-exception: who, when, risk tier (low / critical / irreversible / exfil-eligible), reviewer, expiry
Why your auditor cares

Maps to SOC 2 CC8.1 (change management). The exception ledger is what auditors look for to assess "is the team using exceptions responsibly or as a default escape hatch?"

07

Reliability + correction telemetry

Quarterly reliability dashboard PDF + raw NDJSON
Contents
  • Per-install AI-reliability score trend (F2.1 — where did AI-generated code stay vs. get reverted)
  • Correction-rate per agent (which specialists are reliable, which are drifting)
  • Fleet-wide reliability rollup (org-dashboard aggregate)
  • Maturity score across the F4.12 24-cell rubric
  • Quarterly delta vs. baseline
Why your auditor cares

Maps to the EU AI Act Article 9 (risk management — continuous monitoring) and ISO 42001's "objective measurement of AI system performance" requirements. This is also the leading indicator the customer's board cares about.

08

Sub-processor list

1-page sub-processor list + change-notification log
Contents
  • Every fastpace sub-processor (AI providers, infrastructure, payment, email)
  • Purpose of each, data class accessed, region, retention
  • DPA reference (a copy of each sub-processor DPA available on request)
  • Change log: what changed in the quarter + 30-day notice acknowledgment
Why your auditor cares

Required for GDPR Article 28(4) — sub-processor governance. Required for SOC 2 CC9.1 — vendor management. Customer's legal team often asks for this independently.

09

Penetration test attestation

Most recent pen-test executive summary + remediation log
Contents
  • Executive summary of the most recent annual pen test (under NDA)
  • Findings count by severity (critical / high / medium / low)
  • Per-critical / per-high finding: status + remediation timeline
  • Re-test verification (where applicable)
Why your auditor cares

Required for SOC 2 CC4.1 (monitoring) + CC7.1 (security incident detection). Customer's security review process typically asks for the most recent pen test report under NDA.

10

Evidence-request register

Quarterly ER ledger
Contents
  • Every evidence request opened in the window (initiator, scope, status)
  • SLO compliance: % of requests fulfilled within the 5-business-day SLO
  • Lifecycle transitions per request (requested → in-progress → fulfilled → closed)
  • Signed envelope per fulfilled request
Why your auditor cares

Demonstrates operational maturity — the customer's own auditors and downstream customers can request evidence on-demand and the fulfillment process is measurable.

Cadence

Delivered quarterly. End of quarter, plus 5 business days.

Predictable cadence so your auditor and your internal compliance team can plan around it. No "we'll send the audit pack when we get to it" surprises.

QuarterDelivered byWhy this date
Q1 (Jan–Mar) Mar 31 Audit fieldwork typically starts April for fiscal-year-Dec orgs.
Q2 (Apr–Jun) Jun 30 Mid-year board review window for most regulated companies.
Q3 (Jul–Sep) Sep 30 Quarterly cadence + regulator-common Sep cutoff for federal contractors.
Q4 (Oct–Dec) Dec 31 Year-end pack feeds the annual audit + year-over-year posture trend.
Off-cadence

Plus: ad-hoc evidence requests, 5-business-day SLO.

When your auditor or your downstream customer needs something outside the quarterly cadence, you open an evidence request via fastpace evidence open. Your CSM acknowledges it the same business day. Enterprise SLO: fulfilled within 5 business days. Tracked in the quarterly evidence-request register (section 10) so your audit pack also documents your operational maturity.

Ready to see a real one?

Sample audit packs available under NDA. Book a 30-minute briefing and we'll walk through one for a fictional regulated SaaS customer — same structure, anonymized data.