Continuous Observability + Continuous Assurance. The Trust Layer for Enterprise AI.
Shadow AI is your new shadow IT — only worse.
Continuous Observability + Continuous Assurance. The Trust Layer for Enterprise AI.
Every agent your devs adopt opens a tool-call surface area you can't see. MCP servers connect models to your data without policy enforcement. Prompt injection bypasses your perimeter. Reign is the security control plane for AI.
The CISO problem
The perimeter moved. The controls didn't.
Generative AI has rewritten the security boundary. Engineering teams adopt agents weekly. MCP servers connect models to data without security review. Prompt injection turns a chatbot into an exfiltration vector. SOC 2, ISO 27001, NIST CSF — all written for a perimeter the business has already left behind. The CISO carries the risk; Reign provides the control plane.
Shadow AI is invisible.Most enterprises can't answer a basic question: which AI tools, agents, and MCP servers are actually running in production? Discovery is annual; adoption is daily.
Tool-call surface area explodes.Every agent your devs adopt opens a new tool-call boundary. Without a Gateway, that surface is unmonitored. The threat model traditional AppSec teams know doesn't cover dynamic tool selection.
Prompt injection bypasses the perimeter. WAF, IDS, EDR — none of them see prompt-injection patterns or output-handling violations. The attack lives inside the trusted channel.
SIEM doesn't speak AI.Your SIEM can ingest AI logs, but it doesn't natively understand prompt-injection patterns, tool-call abuse, or model-output anomalies. AI-specific telemetry needs an AI-specific control plane.
Security frameworks, mapped to Reign
Every framework citation, every component, every artifact.
Reign's four-component spine maps directly to the security frameworks your auditors and regulators expect. Each row is a real security question — and the Reign component that delivers the evidence to answer it.
| Framework / Citation | Security Question | Reign Component | Evidence Reign Delivers |
|---|---|---|---|
| OWASP LLM Top 10 | Are we defending against prompt injection, sensitive-info disclosure, and the rest of the LLM attack surface? | AI Gateway | Inline detection for prompt injection (LLM01), output handling (LLM02), training-data poisoning signals (LLM03), and sensitive-information disclosure (LLM06). Tool-call boundary controls for excessive agency (LLM08). Every detection event identity-bound and logged. |
| NIST AI RMF — Security Controls | Are AI-specific security controls Govern / Map / Measure / Manage'd? | Four-Component Spine | Govern: AI Gateway policy enforcement at the edge. Map: Model Risk Validation inventory and risk classification. Measure: Audit Ledger (CAVR) continuous security monitoring. Manage: Assurance Packs and incident response evidence. |
| SOC 2 — Continuous Monitoring (CC7) | Are we monitoring AI systems with the rigor SOC 2 expects? | Audit Ledger (CAVR) | Continuous logging of every AI call, tool invocation, exception, and policy event. SOC 2 CC7 (System Operations) and CC6 (Logical Access) controls operate at AI velocity. Auditor-ready Type II evidence. |
| ISO 27001 — Information Security | Are AI systems integrated into the ISMS? | AI Gateway + Audit Ledger (CAVR) | Annex A controls extended to AI: A.5 (organizational), A.8 (asset management), A.9 (access control), A.12 (operations security), A.16 (incident management). Every AI asset inventoried, identity-bound, monitored, and incident-tracked. |
| CIS Controls — Asset Inventory + Monitoring (C1, C8) | Do we have a complete inventory of AI assets and continuous monitoring? | Model Risk Validation + Audit Ledger (CAVR) | Complete inventory of approved models, agents, tools, and MCP servers. Real-time discovery of unsanctioned AI usage at the Gateway. Continuous monitoring with alerting tied to materiality thresholds. |
The four pillars of AI security
Shadow AI · Policy · Identity · Response.
The four security pillars that AI infrastructure has to deliver — built into Reign by design.
Shadow AI Discovery
What AI is actually running in our environment?
AI Gateway sees every model call, every tool invocation, every MCP server. Sanctioned and unsanctioned. Approved providers and the side-deals nobody told you about. Inventory is continuous, not annual.
Policy at the Edge
Are AI policies enforced before damage, or logged after?
Policy enforcement at the AI Gateway — before the call leaves your perimeter. Identity-bound. RBAC-enforced. Prompt-injection detection inline. Unauthorized actions are blocked, not flagged in next month's SIEM review.
Identity Everywhere
Is every AI call tied to a human or service identity?
SSO, SAML, SCIM, and per-call identity binding. Service accounts, agent identities, tool credentials — all federated. Every model call answers the question: who, on whose behalf, with what authorization.
Response & Forensics
Can the SOC investigate an AI incident with the evidence they need?
Continuous audit chain across LLM, agent, and tool layers. Reproducible queries against the same evidence corpus produce identical artifacts. IR teams can reconstruct the full chain — prompt, context, tool calls, output — for any incident in scope.
For your role on the security chain
Built for the four hands that defend AI.
CISO / VP Security
An AI security control plane you can defend to the board. Reign delivers continuous evidence — not slideware. SOC 2, ISO 27001, NIST, OWASP — all framework-mapped.
Security Architecture
A reference architecture for AI security: Gateway as the policy enforcement point, identity-bound calls, segregated tool surfaces, audit chain by default. Drop-in for zero-trust extensions.
GRC & Compliance
Audit-ready evidence for SOC 2 Type II, ISO 27001, and NIST CSF. Continuous monitoring satisfies the 'operating effectiveness' bar without a quarterly evidence-collection sprint.
IR / SOC
Forensic-grade evidence for AI incidents. Reproducible queries, full prompt and tool-call context, identity binding, and policy decisions — the data your IR playbook needs.
Mapped to your security cadence
Continuous evidence, on every security timeline.
Real-Time Alerting
AI Gateway escalation triggersPrompt-injection attempts, exfiltration patterns, policy violations, and material exception activity escalate immediately to the SOC and security architecture team — with full context and the policy that fired.
Weekly Threat Review
Threat-pattern digestWeekly summary of attack patterns observed at the Gateway, sanctioned-vs-unsanctioned usage shifts, identity anomalies, and material policy violations. Tied to the broader security review cadence.
Quarterly Board Update
Live security dashboardReal-time AI security posture for board updates. Sanctioned-AI inventory, threat patterns, control coverage, regulatory alignment — pulled directly from the audit chain. Walkthrough-ready, not slide-padded.
Annual SOC 2 / ISO 27001 Audit
Submission-ready Assurance PacksSOC 2 CC7 / CC6 / CC8 evidence assembled on demand. ISO 27001 Annex A control evidence, including AI-specific extensions. Auditor-ready Type II artifacts — no quarterly evidence-collection sprint.
Explore the components
Gateway is the first line. Audit Ledger is the third.
AI Gateway
First line of defense. Policy at the edge. Identity-bound. Inline detection. The CISO's control point.
ExploreModel Risk Validation
Second line of defense. Complete AI asset inventory. Sanctioned models, agents, tools, MCP servers — all tracked.
ExploreAudit Ledger (CAVR)
Third line of defense. Continuous audit chain. Forensic-grade evidence. The IR team's data source.
ExploreAssurance Packs
SOC 2, ISO 27001, NIST CSF, NIST AI RMF — submission-ready evidence packets.
ExploreFrequently asked
