Skip to main content

Compliance Cockpit

Enterprise Feature -- The Compliance Cockpit is available exclusively on the Enterprise tier.

The Compliance Cockpit is MeetLoyd's integrated compliance command center, built specifically for enterprises deploying AI agents in regulated industries. It transforms regulatory burden into competitive advantage with automated evidence collection, real-time compliance monitoring, and audit-ready reporting.

Overview

Access the Compliance Cockpit from the layout navigation pill in the top bar -- click Compliance in the Admin | Openspace | Compliance switcher (Enterprise tier, admin/owner role only).

The Cockpit provides:

  • Real-time compliance scores across all enabled governance packs
  • Unified regulation management for GDPR, HIPAA, EU AI Act, SOX, DORA, ISO 27001, ISO 42001, NIS2
  • Automated evidence collection from governance events
  • Risk registry for AI risk management
  • Impact assessments (AIIA, DPIA, FRIA)
  • Policy lifecycle management with version control
  • External auditor portal with token-based access
  • Scheduled reporting in PDF, CSV, and Excel formats
SectionDescription
OverviewCompliance dashboard with scores, trends, and alerts
RegulationsBrowse enabled governance packs and their controls
AssessmentsAI Impact, Data Protection, and Fundamental Rights assessments
Risk RegistryTrack, assess, and treat AI-related risks
ControlsControl matrix with effectiveness tracking
Evidence VaultCryptographically verified audit evidence
ViolationsTrack violations with SLA management
ReportsGenerate and schedule compliance reports
PoliciesPolicy documents with acknowledgment workflow
Auditor SessionsManage external auditor access

Regulations & Frameworks

When you enable a governance pack, its controls automatically appear in the Cockpit.

FrameworkGovernance PackKey Focus
GDPRgdprData protection, privacy rights
HIPAAhipaaHealthcare data protection
EU AI Acteu_ai_actAI system requirements, human oversight
SOXsoxFinancial controls, segregation of duties
DORAdoraDigital operational resilience
ISO 27001iso_27001Information security management
ISO 42001iso_42001AI management system
NIS2nis2Network and information security
SOC 2soc2Trust service criteria
PCI-DSSpci_dssPayment card security

Evidence Vault

The Evidence Vault stores audit evidence with cryptographic verification to ensure integrity.

Evidence Types

TypeDescription
Auto-collectedAutomatically captured from governance events (violations, remediations, configuration changes)
Manual uploadUploaded documents (PDF, images, DOCX, XLSX, etc.) -- max 50 MB
Generated reportSystem-generated compliance reports

Hash Verification

All evidence files are hashed with SHA-256 on upload. Verify integrity at any time to confirm files haven't been tampered with.

StatusMeaning
PendingNot yet verified
VerifiedHash matches stored value
TamperedHash mismatch detected
ErrorVerification failed (file unreadable)

Risk Registry

Track and manage AI-related risks.

FieldDescription
TitleRisk name
DescriptionDetailed risk description
CategoryOperational, technical, compliance, security, reputational, or financial
LikelihoodRare, unlikely, possible, likely, or almost certain
ImpactMinimal, minor, moderate, major, or severe
Inherent ScoreCalculated from likelihood times impact
Treatment StatusIdentified, analyzing, treating, monitoring, or closed
Treatment PlanMitigation strategy
OwnerAssigned user
Review DateNext review deadline

Impact Assessments

Conduct structured assessments for AI systems.

TypeFull NameWhen Required
AIIAAI Impact AssessmentEU AI Act high-risk systems
DPIAData Protection Impact AssessmentGDPR high-risk processing
FRIAFundamental Rights Impact AssessmentEU AI Act public sector

Assessment workflow: Draft → In Review → Approved (or Rejected for revisions).

Policies

Manage compliance policies with version control and acknowledgment tracking.

Policy lifecycle: Draft → Published (requires acknowledgment) → Archived (superseded by newer version).

Each edit creates a new version. Track who has acknowledged each published policy.

Reports

Report Formats

FormatUse Case
PDFBoard presentations, external sharing
CSVData analysis, spreadsheet import
XLSXExcel with multiple sheets

Reports can be generated on-demand or on a schedule (weekly, monthly, quarterly, annually) with email delivery to compliance teams.

Auditor Portal

Provide external auditors with secure, read-only access.

How It Works

  1. Create an auditor session with auditor details, audit type, scope, and expiration date
  2. Optionally scope access to specific evidence items
  3. Share the one-time access token securely with the auditor
  4. Auditors use the token to access a dedicated portal where they can view evidence, compliance status, and submit findings
  5. Track finding workflow: Open → Responded → Closed (or Disputed)
warning

The auditor access token is only shown once at creation time. Share it securely.

Violations

Track governance violations with SLA management.

Violation Sources

Violations flow from the Governance Packs system: DLP policy violations, kill switch triggers, four-eyes principle bypasses, prompt injection attempts, and budget overruns.

SLA Tracking

SeverityDefault SLA
Critical4 hours
High24 hours
Medium72 hours
Low7 days

Remediation Workflow

Open → Acknowledged → Remediated → Closed


Next: Learn about Governance Packs for the underlying control modules.