Compliance built in,
not bolted on

IDProva's three primitives — identity, delegation, and receipts — map directly to security controls across major frameworks.

NIST SP 800-207 — Zero Trust Architecture

ZTA TenetIDProva ControlImplementation
All resources are distinct identitiesAIDsEvery agent gets a W3C DID with Ed25519 keys
All communication securedDAT verificationAll actions require valid, signed DAT
Per-session accessShort-lived DATsExpiry, rate limits, depth limits, geofencing
Dynamic policyConstraint engineRuntime evaluation of IP, trust level, action count
Continuous monitoringReceipt logHash-chained, independently verifiable audit trail
Dynamic authReal-time verificationRevocation + constraint checks on every request
Asset informationAID registryFull inventory: identities, delegations, audit trails

Australian ISM

ISM ControlDescriptionIDProva Mapping
ISM-0432Validate before granting accessDAT verification: signature → timing → scope → constraints
ISM-1503No privileged access to standard usersScoped DATs — agents only get explicitly granted permissions
ISM-1507Limit privileged access4-part scope grammar enforces least privilege
ISM-0580Log all user actionsReceipt log: signed, timestamped receipt per action
ISM-0585Immediate access removalDAT revocation is immediate; checked before crypto
ISM-0457Approved crypto algorithmsEd25519 only; hard-reject non-EdDSA tokens

SOC 2

ControlDescriptionIDProva Component
CC6.1Logical access securityDAT-based access control with cryptographic verification
CC6.3Role-based accessScoped delegation tokens with constraint engine
CC7.2System monitoringHash-chained receipt log with tamper detection

NIST SP 800-53

IDProva maps to the following 800-53 control families:

AU-2, AU-3, AU-8, AU-9, AU-10, AU-12

Audit and accountability — receipt log with hash-chain integrity

IA-2, IA-5, IA-8

Identification and authentication — AID with Ed25519 cryptographic binding

AC-2, AC-3, AC-6

Access control — scoped DATs with least-privilege enforcement

SC-8, SC-12, SC-13

System and communications protection — Ed25519/BLAKE3 cryptography

Need compliance documentation for your assessment?

Enterprise and Government tiers include automated compliance reports. Or book a consulting session for hands-on assessment support.