Free Admissibility & Citation Gap Briefing.Map your brand's footprint across the AI ecosystem and identify unverified Shadow Sources. Available for regulated enterprise evaluators.Secure Your Audit →

Stop guessing. Start governing.

Digital Trust posture for ISO/IEC 42001, NIST 800-171, and the EU AI Act—operationalized at the deterministic execution boundary.

In the era of Agentic AI, "I think it's safe" is a liability. BiDigest replaces probabilistic safety policies with an Admissibility Control Plane. We enforce continuous control over your agentic and corporate AI footprint, turning undocumented risk into a Merkle-sealed Defensibility Artifact for your board, auditors, and insurers.

For public citation share and per-LLM market readouts, use the Visibility Engine— this page is execution governance only.

From intent to commit: T₀ and T₁

T₀ is when an action is first presented—routing, payload shape, and early gates treat it as unverified intent. T₁ is the commit boundary: deterministic checks run again before anything binding happens, including org lifecycle (active vs suspended). If the organization is inactive, API authentication returns HTTP 403; on seal paths, telemetry can be shunted with breach codes such as ORG_SUSPENDED_AT_T1 where applicable—fail-closed, not a “best effort” filter.

Wall-clock time is route- and deployment-dependent. Governed egress sealing and staleness monitoring use different cron paths—do not promise one universal sub-50ms wall on every integration.

Canonical definitions: Trustee handbook · How it works.

Why this matters now

Governance under convergence

The question is shifting from "Do we have an AI policy?" to "Can we afford the gap between what we approved earlier and what we are about to commit?" Three pressures often land on the same systems and budgets—so routing around execution architecture gets expensive.

  • Liability & operational risk

    Agentic and automated workflows raise expectations for attribution and replay after a bad outcome—not a slide deck alone.

  • Regulatory & audit clocks

    Frameworks increasingly expect demonstrable controls and traceable decisions for material systems—scope varies by tier and jurisdiction.

  • Cryptographic transition

    PQC roadmaps and long-lived evidence raise the cost of informal audit trails and mutable narratives.

Structural risk: time-of-check to time-of-use—approving intent at t1 and executing against the world at t4 without re-binding at the commit boundary is how stale authority becomes committed reality.

From

  • Visibility and post-hoc logs as the whole story
  • "We evaluated it upstream"

To

  • Admissibility and evidence at the execution boundary for state-changing actions
  • Provable record of what crossed the boundary, when

The end of "performance theater"

Static policies and periodic audits cannot govern AI operating at machine speed. Regulators—including the Bank of England PRA and the SEC—are moving toward continuous control: real-time risk visibility and system-level accountability. BiDigest enforces governance across two structural boundaries:

The admissible state space (upstream)

We calculate a per-LLM Identity Fidelity Quotient (IFQ) against your encrypted Ground Truth and Anchor Prose. We surface Shadow Sources—stale docs, unapproved APIs, or third-party narrative—before they can justify a harmful or non-compliant state-change.

The commit boundary (downstream)

No silent failures. The commit boundary applies deterministic checks—including Triple-Lock where that lane is configured—before binding effects. Wall-clock latency is deployment-dependent; we do not claim the same millisecond budget on every integration path. The system fails closed and does not rely on vendor “safety” vibes or a 24-hour inbox queue to catch bad payloads.

Immutable ground truth you can prove

When an auditor or client asks why an AI made a specific decision, mutable server logs and vendor dashboards are not enough.

  • Merkle-sealed evidence packs. Every admitted agentic resolution is backed by raw evidence, sealed with SHA-256 (and Merkle-chained where Trustee flows apply). You can show exactly what was ingested and what was executed.
  • Supply-chain liability defense. Third-party AI must not bypass your enterprise gate. The Sovereign Vault pattern ensures vendor outputs are verified before they interact with operations—aligned with enterprise liability when deployment, not only the vendor, is in scope.
  • No averaged scores. Risk is computed with per-model granularity (e.g. ChatGPT vs. Claude vs. Gemini). There is no single "overall score" that hides a critical failure on one surface.

Verify a sealed run when your organization publishes verification URLs.

The AI Governance Maturity Assessment

See whether your controls are advisory, procedural, or deterministic at the execution boundary.

Question 1 of 5

The Execution Boundary

An autonomous agent proposes a $50,000 credit adjustment in your ERP. What happens?

Built for 2026 audit trails

The BiDigest Admissibility Engine maps to the frameworks that drive enterprise survival:

EU AI Act (Art. 13 & 14)

Operationalized through per-LLM transparency findings and Human-in-the-Loop (HITL) affirmation blocks tied to the Forensic Ledger—ex-post documentation and oversight evidence, not manual review of every execution in place of the Commit Boundary.

NIST AI RMF 2.0

Feeds Govern / Measure / Manage with quantitative IFQ metrics and deterministic drift classifications—not narrative-only risk registers.

Continuous recertification

A 90-day rolling audit trail with an Executive Compliance Scorecard (production-ready %, recertification status, per-system metadata)—continuous control, not annual slide updates alone.

ISO/IEC 42001

Supporting evidence for AI management system certification: monitoring, oversight, and tamper-evident artifacts you can hand to an assessor.

Close the consequence gap.

Map your regulatory perimeter and see how deterministic gates apply to your stack—no generic contact form.

Human oversight and the Forensic Ledger

Execution is decided at the Commit Boundary in milliseconds. Humans do not replace that gate with email queues for every payload. For EU AI Act Art. 14, your designated overseer affirms oversight using HITL blocks tied to the Merkle-sealed ledger—proving who reviewed what, after the deterministic admit/deny decision is recorded.

  • • Typically a COO, CCO, or engineering risk owner—not an untrained queue.
  • • Empowered to trigger remediation and policy updates when the ledger shows drift or policy change.
  • • Documented in artifacts your auditor can trace to hashes, not screenshots.
Go to Admissibility Vault intake

Read Invisible No More for the full narrative. Stakeholder objections (CTO / CCO / auditor).

Glossary FAQs

Short definitions used across the governance funnel—same text as the page's FAQPage JSON-LD for citations.

What is Admissibility?

Admissibility is whether an AI output or action is allowed to cross the execution boundary: grounded in approved Ground Truth and policy, with cryptographic proof — not guessed from unverified sources.

What is IFQ?

IFQ, or Identity Fidelity Quotient, is a deterministic measure of how closely an agent’s proposed intent aligns with your authorized corporate or regulatory identity and Anchor Prose, computed per model where multiple LLMs are in scope.

What is a Shadow Source?

A Shadow Source is an unverified input path — outdated documentation, rogue APIs, or third-party text — that can distort decisions if it is treated as truth. Governance maps and controls these before they drive state-changes.

What is Governance-as-Code?

Governance-as-Code is machine-readable policy and schema wired into the control plane so enforcement is deterministic at runtime, not only described in slide decks.

What is T₀ (intent) in BiDigest governance?

T₀ is when an action is first presented: routing, payload shape, and early gates treat it as unverified intent until the commit lane proves otherwise.

What is T₁ (commit boundary)?

T₁ is the commit boundary: deterministic checks run again before anything binding happens, including org lifecycle (active vs suspended). Triple-Lock applies where that lane is configured—not delegated to an LLM vendor’s probabilistic “safety” verdict.

What is HTTP 403 at the ingress boundary?

When API authentication determines the organization is inactive, the request fails fast with HTTP 403—refusal before downstream work. On seal paths, telemetry can be shunted with breach codes such as ORG_SUSPENDED_AT_T1 where applicable—fail-closed, not a best-effort filter.

What is a structural breach?

A machine-detectable violation of invariants at the boundary (for example org missing at T1, org suspended at T1, or claim validation failure), emitted as breach codes on governed paths—not a blended model score.

Full AI Governance glossary

Try the execution-boundary simulator · API integration brief · Sovereign Tier · Pricing

Sovereign KB · IFQ · per-LLM — ask here