Trust & compliance posture
Honest status,
named timelines.
This page tells procurement reviewers exactly where Roam stands on SOC 2 Type II, ISO/IEC 42001, EU AI Act Article 12 record-keeping, and the NIST AI Risk Management Framework — and what artifacts (DPA, sub-processor list, security contact, vulnerability disclosure, data-flow diagram) we can hand over today. Evidence support and control mapping. Not certification.
Built in Athens · Made in the EU · Evidence stays on your machine and hash-verifies offline · No analytics · No cookies
Where we are today
Four frameworks procurement teams ask about, with our actual status and named timelines. No current independent attestation against any of these; when that changes we will publish the auditor or certification-body name and the report excerpts directly on this page.
SOC 2 Type II — in design
Controls in design. Audit kickoff scheduled Q4 2026; Type II
report expected Q1 2027. No current independent attestation.
We will publish the auditor name and the report excerpts on
this page when the report is issued.
ISO/IEC 42001 — gap analysis underway
AI management system gap assessment in progress against the
ISO/IEC 42001:2023 control set. Target certification-body
engagement Q2 2027; expected certificate Q3 2027. No current
certification.
EU AI Act Article 12 — evidence layer shipped
Roam's tamper-evident audit-trail and proof-bundle substrate
generates the record-keeping evidence Article 12 requires for
high-risk AI systems listed in Annex III. Whether your system
falls under Article 12 is your DPO's and counsel's call;
Roam supplies the evidence layer to support that
determination.
NIST AI RMF — voluntary frame
The NIST AI Risk Management Framework 1.0 (Jan 2023) is a
voluntary framework. We map Roam's evidence outputs to the
MAP / MEASURE / MANAGE / GOVERN categories so customers
without a mandated regime can still anchor their AI-agent
change-control program to a recognized reference.
See the governance page control mapping for the row-by-row table tying each evidence type to the SOC 2, ISO 42001, NIST AI RMF, and EU AI Act Article 12 clauses it supports.
What we have right now
Artifacts a procurement reviewer can collect today, before the Q1/Q3 2027 attestation milestones above. All five are public on GitHub or this site; nothing is gated behind a sales conversation.
- 1 Data Processing Addendum (DPA). GDPR-aligned DPA template covering the customer-as-controller, Roam-as-processor relationship for Roam Review engagements. Lists processing categories, retention windows, sub-processor change notice, and audit rights. Published at templates/legal/dpa.md.
- 2 Sub-processor list. Current sub-processors are listed in section 6 of the privacy policy with their purpose and EU/US location. Material additions trigger 30-day advance notice per the DPA. The CLI has no runtime sub-processors — it executes entirely on your machine.
-
3
Security contact.
[email protected]— OpenPGP key auto-published by Proton. Discoverable via the security.txt file at the standard well-known location. Acknowledgement within one business day. - 4 Vulnerability disclosure policy. Full coordinated-disclosure policy on the security page: scope, safe-harbor terms, remediation SLAs (high within 30 days, medium within 90, low at next scheduled release), and a default 90-day public-disclosure window we extend on reporter request.
-
5
Data-flow diagram.
The CLI's data flow is short enough to inline: your source
code is read from the local working tree, parsed and indexed
into a local SQLite database under
.roam/, and analyzed by local processes. Nothing leaves the machine — there is no telemetry, no analytics, no model-training upload, and no inbound network listener. Roam Review and Roam Cloud data flows are documented inside the procurement packet.
Roam's evidence layer
While the framework attestations are in flight, the free CLI already ships four evidence substrates auditors and reviewers can consume directly. None of them is a substitute for a SOC 2 or ISO 42001 report; they are the inputs an audit would draw from.
Tamper-evident audit trail
CGA-signed event records covering every command an agent or
human ran against the local repo. Forwards-compatible with
cryptographic signature schemes; today the bundles are signed
with in-toto v1 + cosign so reviewers can verify integrity
without contacting us.
Proof bundles per PR
roam pr-bundle init / emit packages the
preflight, impact, critique, and test artifacts associated
with a single change into one signed bundle. Reviewers see
exactly what context the agent consumed before editing.
Mode enforcement
Four cumulative action surfaces — read_only,
safe_edit, migration,
autonomous_pr — declared per run and enforced
by the local control plane. Mode escalations are logged
with timestamps and the lease record of the human approver.
Run ledger with HMAC chain
Each roam runs session opens an event ledger
with HMAC-chained entries. Tampering with any historical
entry breaks the chain; roam runs verify reports
the first divergent event so a reviewer can identify any
post-hoc edits without trusting our infrastructure.
For the full control-mapping table from these four substrates to SOC 2 CC8.1, ISO/IEC 42001 Annex A, NIST AI RMF, and EU AI Act Article 12, see the Agent Governance Evidence Pack page.
Need a question answered for an in-flight procurement review, or a redacted DPA reviewed against your standard? Email [email protected] — acknowledgement within one business day.