Haldir audit-prep evidence

demo_ef62b4fc828b · tier free · period 2026-02-16T11:37:01+00:00 → 2026-05-17T11:45:38+00:00 · generated 2026-05-17T11:45:38+00:00
50%
Haldir audit-prep
Gaps to close
✓ 1 passing  ·  ! 5 warnings  ·  ✗ 1 failing
Not a SOC2 attestation — measures how well your Haldir deployment aligns with signals relevant to a SOC2 audit. A full audit requires evidence across your entire organization, not just what Haldir sees.
CC6.1At least one API key uses restricted scopesWARN
All active keys hold wildcard scope ['*'].
Mint scope-restricted keys for non-admin uses: `haldir keys create --scopes audit:read,sessions:read`.
CC6.7Persistent encryption key configuredPASS
HALDIR_ENCRYPTION_KEY is configured. Cipher: AES-256-GCM.
CC7.2Audit chain verifies with recent entriesFAIL
Audit log is empty.
Log the first action: `haldir audit log <session-id> --tool <name> --action <verb>`.
CC7.2RFC 6962 Signed Tree Head over the audit logWARN
Audit log is empty — tree-head signs the empty tree.
Log any action; the Merkle tree populates automatically.
CC7.3Webhook alerting operational (>=95% 24h)WARN
No webhook endpoints registered.
Register at least one alert endpoint: `haldir webhooks register <url>` or POST /v1/webhooks.
CC5.2At least one session runs with a spend capWARN
No sessions exist yet.
Mint a session with `haldir session create --agent <id> --spend-limit 5.00`.
CC8.1Human-in-the-loop approvals configuredWARN
No approval rules configured and no decisions recorded.
Register a rule for risky actions: POST /v1/approvals/rules with a rule_type + threshold.
Period:

1 · Identity

2 · Access control relevant to SOC2 CC6.1

API key inventory + per-key scope list. Contributes to CC6.1; full criterion also requires documented access policy, provisioning/de-provisioning procedures, periodic access reviews, and SSO/MFA enforcement.

prefixnametierscopeslast usedrevoked
hld_sew4YTR2compliance-demofree*neverno

3 · Encryption relevant to SOC2 CC6.7

Vault uses AES-256-GCM with AAD binding to (tenant_id, secret_name); ciphertext is non-portable across tenants. Contributes to CC6.7; full criterion also requires documented encryption standards, key-management procedures, and TLS-in-transit evidence.

4 · Audit trail relevant to SOC2 CC7.2

SHA-256 hash chain over every recorded agent action. Contributes to CC7.2 by producing tamper-evident logs an auditor can spot-check. Full criterion also requires documented anomaly detection and incident-response procedures.

5 · Spend governance relevant to SOC2 CC5.2

Per-session spend caps + payment-authorization records with remaining-budget snapshots. Contributes to CC5.2 by proving risk limits are enforced at the platform layer.

6 · Human approvals relevant to SOC2 CC8.1

Approval-request lifecycle (created → approved/denied with note) for agent actions. Contributes to CC8.1 as evidence of human-in-the-loop controls; full criterion covers software change management more broadly (code review, test coverage, deploy approvals).

7 · Outbound alerting relevant to SOC2 CC7.3

Outbound webhook deliveries (per-attempt status, retries, backoff) proving the alerting channels Haldir fires are operational. Contributes to CC7.3; full criterion also requires documented incident-response procedures.

8 · Document signature

a63632edc38ca4a2cd23b8d216c4da184e385d26c8bd5b9498bb84c305545074

Verify by re-issuing this evidence pack against the same period and comparing the digest above to the one returned by /v1/compliance/evidence/manifest.