Skip to main content

Compliance Mapping

Use this matrix to align TRF artifacts with common automotive and AI compliance requirements. The goal is to reuse the same evidence package across multiple audits.

Evidence areaISO 26262Automotive SPICEUN-R155/R156AI/ML Governance
Requirements managementrequirement, safety_requirementSYS.2, SWE.1Update policies (ota_campaign)Model requirements (requirement with tags: ["ml"])
Hazard/threat analysishazard, safety_goalMAN.3 risk trackingthreat, vulnerability, risk_assessmentAlgorithm impact assessments (risk_analysis)
Architecture & designdesign, componentSYS.3, SWE.3Security controls (control)Model architecture (model with lineage)
Verification & validationtest, coverage reportsSWE.5/SWE.6Post-update tests, monitoring reportsModel validation metrics, dataset coverage
Configuration/change controlmanifest.json, change request linksSUP.1, SUP.8CSMS operation recordsExperiment logs (experiment)
Production & deploymentwork_instruction, maintenance_planSUP.9Deployment reports (ota_campaign)Deployment monitoring (runtime_monitor)

Creating multi-standard packs

  1. Choose a primary profile (e.g., automotive_safety).
  2. Add extensions for additional domains (ai_ml, cybersecurity).
  3. Define validation targets per standard (ASIL coverage, regression coverage, vulnerability remediation coverage).
  4. Tag artifacts with relevant standards (tags: ["ISO26262", "UNR155"]).

Reporting shortcuts

  • tw export --format iso26262 – Safety summary (requirements, hazards, verification status).
  • tw export --format aspice – Process-oriented summary keyed by base practices.
  • tw export --format unr155 – Cybersecurity posture summary with threat/control mapping.
  • tw export --format ai-governance – Dataset/model lineage and bias metrics.

Sharing with stakeholders

  • Supply chain partners can deliver their own TWPack files; import them using tw merge and preserve provenance via signatures.
  • Auditors receive the TWPack plus targeted HTML/PDF exports; they can verify signatures independently.
  • Regulatory submissions reference package checksums and repository tags to ensure authenticity.

For concrete examples, review sector-specific guides in Use Cases.