SENTINEL
LOADING AUDIT ENGINE…
LIVE AUDITS VERIFIED | LATENCY: 0.21ms | NODE: CF-EEUR-1

Compliance
Architecture

A technical deep-dive into the three pillars that make Sentinel's audit evidence legally admissible and regulatorily defensible: Zero-Egress processing, WASM immutability, and D1 strong consistency.

🔒
SECURITY ARCHITECTURE

Zero-Egress Data Processing

Definition

Zero-egress means that no data submitted to the Sentinel audit engine ever leaves the computational boundary of your Cloudflare Worker. Model manifests, training metadata, inference parameters — all are processed in-process and immediately discarded after verdict generation.

Technical Implementation

Sentinel's WASM module is loaded directly into the Worker V8 isolate. Input data is passed via in-memory pointer (not serialized over a socket). The module executes, writes the verdict hash to D1, and the raw input is garbage-collected within the same event-loop tick.

Why It Matters for Compliance

GDPR Article 46 transfer restrictions, the EU AI Act's downstream provider obligations, and sector-specific data localization requirements (DORA, MDR) all require proof that sensitive AI inputs do not cross data-processing boundaries. Sentinel's architecture makes this certifiable by design — not just by policy.

Evidence Artifact

Cloudflare publishes network egress logs per Worker endpoint. Sentinel generates zero outbound bytes on the audit path. You can validate this in your Cloudflare Dashboard > Workers > Sentinel > Analytics > Egress.

🧱
COMPUTATIONAL INTEGRITY

WASM Compiled Immutability

Determinism Defined

A deterministic audit engine produces the exact same verdict for the exact same input — always. This is mathematically guaranteed by the Rust-to-WASM compilation model: there are no stochastic operations, no probabilistic classifiers, and no runtime model weights that could shift between calls.

Why LLM-based Auditors Fail the Determinism Standard

LLM-based compliance tools use transformer inference, which is inherently probabilistic. The same prompt submitted twice may produce different verdicts. This makes them inadmissible for legal evidence because opposing counsel can trivially demonstrate inconsistency. Sentinel's output is reproducible by any third party with access to the same WASM binary and input.

Version-Pinned Rule Trees

Each compliance check runs against a pinned version of Sentinel's EU AI Act rule tree. The version number is embedded in every D1 audit record. If the EU passes an Amendment, we release a new WASM minor version — and all prior audit records remain verifiable against the rule set that was in effect at the time of audit.

Tamper Evidence

The WASM binary itself has a SHA-256 content hash that is published to our transparency log. Any modification to the audit logic changes the binary hash, making tampering trivially detectable. Enterprise customers receive a signed attestation document containing this hash for their compliance registers.

🗃️
DATA INTEGRITY

Cloudflare D1 Strong Consistency

Architecture

Cloudflare D1 is a serverless SQLite database with read replication at the edge. Sentinel writes audit records to the primary D1 instance using a synchronous, sequential write path. Each write is confirmed before the API response is returned, ensuring that no audit record is ever 'lost in transit'.

Append-Only Write Pattern

Sentinel's D1 schema has no UPDATE or DELETE operations on the audit_logs table. All insertions are INSERT-only. The Worker's D1 binding is configured with execute privileges only — no DDL or destructive DML statements are possible from application code. This is enforced at the binding level, not just application policy.

Server-Side Timestamping

All `created_at` timestamps are generated by D1's server clock at write time (DEFAULT CURRENT_TIMESTAMP). Application code cannot inject or override timestamps. This means the temporal evidence chain is controlled entirely by Cloudflare's infrastructure-level clock, which is synchronized to GPS-calibrated NTP and auditable by Cloudflare's own infrastructure logs.

Recovery & Durability

D1 provides point-in-time recovery (PITR) at the Cloudflare infrastructure level with 30-day retention. Enterprise customers on the Scale-Up plan receive access to Sentinel's own D1 export endpoint, allowing them to maintain a secondary backup of all audit records in their own S3-compatible storage.

Architecture → Regulation Mapping

SENTINEL FEATUREEU AI ACT ARTICLECOMPLIANCE EVIDENCE
Zero-Egress WASM Exec Art. 10 (Data Governance) No outbound network bytes on audit path
D1 Append-Only Writes Art. 12 (Record-Keeping) Immutable timestamp chain per audit
Deterministic Verdict Art. 13 (Transparency) Same input → same output, reproducible
Webhook Alerts Art. 14 (Human Oversight) Real-time alerts on non-compliant verdicts
Version-Pinned Rules Art. 17 (Risk Mgmt) Each record embeds rule version at audit time
SHA-256 WASM Hash Art. 72 (Market Surveillance) Binary integrity provable by third parties

Ready to Provision
Compliant Infrastructure?