🧠 AI Assistant
Compliance Reports

Compliance Reports — nat ai compliance-report

Quick use:

nat ai compliance-report --framework owasp --output report.pdf

What it does

nat ai compliance-report takes your scan results and generates an audit-ready narrative report that maps each finding (and each passing check) to the requirements of a compliance framework.

Instead of handing an auditor a raw findings list, you get a structured document that:

  • Maps every scan finding to the relevant framework control
  • Explains the remediation status of each control
  • Includes evidence references (scan IDs, finding IDs, timestamps)
  • Summarizes your overall compliance posture with a pass/fail breakdown

Supported frameworks

FrameworkFlag valueKey areas covered
OWASP API Top 10owaspAPI1–API10, injection, auth, data exposure
PCI-DSSpci-dssRequirements 6, 10, 11 — software security, logging, testing
HIPAAhipaaTechnical safeguards: access control, audit controls, integrity, transmission security
SOC 2soc2CC6, CC7 — logical access and system operations

Command options

FlagDescriptionDefault
--frameworkCompliance framework: owasp, pci-dss, hipaa, soc2Required
--scan-idScan to report on (uses latest if omitted)latest
--outputOutput file pathstdout
--formatOutput format: pdf, html, markdownmarkdown

Example report excerpt

## OWASP API Security Top 10 — Compliance Report
**Scan:** scan_001 | **Generated:** 2024-01-15 | **Status:** ⚠️ Partial
 
### API1:2023 — Broken Object Level Authorization
**Status:** ❌ FAIL
 
NAT identified 1 critical BOLA vulnerability on GET /api/v1/users/{id}.
Authenticated users can retrieve records belonging to other users.
 
**Evidence:** finding_003 — Scan scan_001 — 2024-01-15T10:22:00Z
**Remediation required before:** This control cannot be marked compliant
until finding_003 is resolved and a clean scan is verified.
 
---
 
### API2:2023 — Broken Authentication
**Status:** ✅ PASS
 
All 12 authentication-related checks passed. Token expiry, refresh token
rotation, and brute-force protection are functioning correctly.
 
**Evidence:** scan_001 — checks auth_001 through auth_012 — all passed.

Embeddable badges

After generating a report, NAT provides shields.io-compatible badge URLs you can embed in your README:

![OWASP Compliance](https://img.shields.io/badge/OWASP%20API%20Top%2010-8%2F10%20passed-yellow)
![PCI-DSS](https://img.shields.io/badge/PCI--DSS-compliant-brightgreen)

Plan requirements

PlanCompliance reports
Free— (not available)
Pro5 reports / month
TeamUnlimited
⚠️

Compliance reports are available on Pro and Team plans. Free plan users can see a report preview in the dashboard but cannot export or download full reports.


Want to just scan? Quick Scan guide →

Was this helpful?