AISentinel issues cryptographic evidence for data lifecycle events so you can prove compliance to auditors and regulators. This guide explains deletion proofs, tamper-evident ledgers, and verification workflows.
| Proof | Description | Primary Use Cases |
|---|---|---|
| Deletion Proof | Merkle-proof-backed receipt confirming artifacts were destroyed. | GDPR right-to-be-forgotten, CCPA deletion requests |
| Retention Proof | Signed attestations that artifacts are preserved with immutability controls. | SOC 2 evidence, legal holds |
| Tamper-Evident Log Proof | SHA-256 hash chain anchored to public transparency logs. | Demonstrating log integrity for regulators |
sha256(content) and prev_hash to form a hash chain.curl -X POST "https://api.aisentinel.ai/v1/proofs/deletion" \
-H "Authorization: Bearer $AISENTINEL_ADMIN_KEY" \
-H "X-AISentinel-Tenant: $AISENTINEL_TENANT_ID" \
-H "Content-Type: application/json" \
-d '{
"datasetId": "pii-snap-2024-02",
"reason": "GDPR erasure",
"notifyWebhook": "https://hooks.acme.io/aisentinel-proofs"
}'
The response includes a proofId and status pending. Use GET /v1/proofs/{proofId} to download the final ZIP archive containing:
proof.json – metadata and signaturesmerkle_path.json – path from leaf to rootsignature.pem – detached CMS signatureAISentinel publishes verification libraries in the Python SDK and JavaScript SDK. Verification consists of:
signature.pem matches AISentinel’s public certificate.merkle_path to match the provided root.Example Python snippet:
from aisentinel.proofs import ProofVerifier
verifier = ProofVerifier()
proof = verifier.load_zip("deletion-proof.zip")
if verifier.verify(proof):
print("Proof valid", proof.anchor.tx_id)
else:
raise RuntimeError("Proof invalid: tampering detected")
proof.ready events using patterns in Webhook Integrations.404 proof_not_found: Ensure the proof ID is valid and the tenant matches.GET /v1/proofs/certificates.Cryptographic proofs provide defensible evidence that complements AISentinel’s governance controls. Incorporate them into your compliance playbooks alongside BYOK and Key Rotation.