Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.rootkey.ai/llms.txt

Use this file to discover all available pages before exploring further.

How ROOTKey Enables Compliance

Modern regulatory frameworks increasingly require organisations to prove what happened, when it happened, and that records have not been altered - not just assert it. The burden of proof is shifting from assurance to evidence. ROOTKey anchors data to the blockchain at the moment it is created, producing cryptographic proofs that:
  • Cannot be backdated - blockchain timestamps are set by network consensus, not by your systems or administrators
  • Cannot be altered - once anchored, records are immutable regardless of who has database or infrastructure access
  • Can be verified independently - regulators and auditors can verify records without your cooperation, without accessing your systems
This single capability - tamper-evident, timestamped, independently verifiable records - maps directly to specific articles and control requirements across the major regulatory frameworks.

Coverage at a Glance

European Union

NIS2, DORA, GDPR, eIDAS 2.0, CSDDD - the core regulatory stack for EU-operating organisations

International Standards

ISO 27001, ISO 28000, IEC 62443, PCI-DSS - framework compliance for regulated industries globally

United States

SOX, 21 CFR Part 11 - evidence and record integrity obligations for US markets and FDA-regulated research

Quick Reference Table

FrameworkRegionKey Articles / ControlsROOTKey Coverage
NIS2EUArt. 21(2)(h) cryptography · Art. 21(2)(b) incident handling · Art. 23 reportingTamper-evident audit trails, incident evidence, cryptographic records
DORAEU · FinancialArt. 17 incident management · Art. 19 reporting · Art. 28 third-party riskICT audit logs, incident evidence packages, software supply chain integrity
GDPR / RGPDEU · GlobalArt. 5(1)(f) integrity · Art. 32 security · Art. 33 breach notificationRecord integrity, processing logs, breach evidence, GDPR-compatible off-chain deletion
eIDAS 2.0EUArt. 41–42 qualified electronic timestampsBlockchain-based timestamps with legal standing under eIDAS
CSDDDEUSupply chain due diligence obligationsImmutable multi-party provenance records across supply chain tiers
EU AI ActEUArt. 12 logging · Art. 9 risk management · Art. 11 technical documentation · Art. 14 human oversightTamper-evident AI decision logs, model provenance, conformity assessment records
ISO 27001InternationalA.5.33 record protection · A.8.15 logging · A.8.9 configurationTamper-evident log protection, cryptographic record integrity
ISO 28000InternationalSupply chain security management systemBlockchain-backed custody records for supply chain security
IEC 62443InternationalSR 3.3 data integrity · SR 6.1–6.2 audit log protectionOT/IACS data integrity anchoring via MQTT
PCI-DSS v4.0InternationalReq. 10.3 audit log integrity · Req. 10.5 audit log reviewTamper-evident cardholder environment audit logs
SOXUnited States§ 302/404 internal controls · § 409 real-time disclosureCryptographically verifiable financial audit trails
21 CFR Part 11United States (FDA)§ 11.10(e) audit trails · § 11.10(a) record validationElectronic record integrity for regulated clinical and pharmaceutical submissions

Data Sovereignty

For organisations subject to EU data residency requirements, ROOTKey supports a 100% EU-sovereign deployment using EBSI (European Blockchain Services Infrastructure) and OVH cloud - with no data leaving EU jurisdiction at any stage. European Data Sovereignty

Request a compliance architecture review

We’ll map your regulatory obligations to a concrete ROOTKey implementation and provide compliance documentation support for auditors and regulators.

Get started - free account

Create a sandbox vault and test compliance-grade anchoring before committing to a production architecture.