Multi-Framework AI Compliance: How Global Enterprises Handle 12+ Overlapping Regulations
A global financial services company operating in New York, London, Frankfurt, Sydney, and Singapore doesn't get to choose which regulations apply. They all apply simultaneously. SOX + GDPR + HIPAA + MiFID II + FCA + DORA + NIS2 + AML + PCI-DSS + ISO 27001 + NIST CSF + SOC 2.
The question isn't "which ones do we need to comply with." The question is "how do we build a single governance architecture that satisfies all of them without creating 12 separate compliance silos."
The answer is that most frameworks require the same underlying controls — they just describe them differently and attach different evidence requirements.
The Overlap Is Your Advantage
Across 12+ compliance frameworks, four core controls appear in nearly every one:
| Control | Who Requires It |
|---|---|
| Audit trail (tamper-evident, retained) | GDPR, HIPAA, SOX, AML, MiFID II, DORA, NIS2, PCI-DSS, ISO 27001, SOC 2, CMMC, FedRAMP |
| Human oversight for high-risk decisions | GDPR Art. 22, HIPAA, EU AI Act, MiFID II, DORA, AML (SAR), SOX Sec. 302 |
| Access controls on sensitive data | All 12+ |
| Incident detection and response | GDPR (72h), HIPAA (60d), SEC Cyber (4d), DORA (4h+72h), NYDFS (24h), NIS2 (24h+72h) |
Building one architecture that satisfies these four controls for all frameworks is more efficient than building 12 separate compliance programs.
A Single Manifest for Multiple Frameworks
The global enterprise manifest isn't 12 manifests — it's one manifest with policy fields that satisfy multiple frameworks simultaneously:
{
"constraints": {
"require_human_approval": [
"payment:execute",
"trade:execute",
"report:submit",
"data:write"
],
"audit_retention_days": 2555,
"per_action_type_budgets": {
"payment:execute": 100,
"trade:execute": 200
}
},
"policy": {
"jurisdiction_allowlist": [
"US", "EU", "UK", "AU", "SG",
"DE", "FR", "NL", "IE", "LU"
],
"counterparty_denylist": ["sanctioned.example"],
"amount_caps": {
"USD": 50000,
"EUR": 47000,
"GBP": 42000
},
"require_capability_token": true,
"approval_thresholds": {
"action_types": ["payment:execute", "trade:execute"],
"amount": 10000,
"currency": "USD"
}
}
}
What each field satisfies across frameworks:
require_human_approval:
- GDPR Art. 22 (automated decision oversight) ✓
- EU AI Act (human oversight for high-risk AI) ✓
- MiFID II Art. 17 (kill switch + human control) ✓
- SOX Sec. 302 (CEO/CFO review before disclosure) ✓
- AML (SAR filing requires human determination) ✓
audit_retention_days: 2555:
- HIPAA (6 years) ✓
- MiFID II (5 years) ✓
- SOX (7 years) ✓
- AML/BSA (5 years) ✓
- DORA (record-keeping) ✓
- PCI-DSS (1 year immediate, 3 years available) ✓
amount_caps:
- AML ($10k CTR threshold) ✓
- PCI-DSS (large transaction controls) ✓
- MiFID II (order size limits) ✓
- MiCA (€10k Travel Rule threshold) ✓
counterparty_denylist:
- OFAC/AML (sanctions screening) ✓
- MiCA (mixer prohibition) ✓
- GLBA (prohibited transactions) ✓
require_capability_token:
- ISO 27001 A.8.18 (privileged access control) ✓
- PCI-DSS Req. 8.3.6 (authentication) ✓
- CMMC (access control) ✓
- FedRAMP AC controls ✓
Where Frameworks Diverge
The overlap handles the common controls. Frameworks diverge on:
Retention specifics: SOX requires 7 years; HIPAA requires 6 years from last effective date (not just creation); MiFID II requires 5 years from date of transaction; GDPR requires retention "no longer than necessary" (determined by your retention schedule). The safe answer: take the maximum (7 years, 2555 days) and apply it universally.
Incident notification timelines: DORA's 4-hour initial alert, NYDFS's 24 hours, SEC's 4 business days, HIPAA's 60 days, GDPR's 72 hours. Build your incident response process around the most aggressive timeline (DORA's 4 hours) and you'll meet all others by definition.
Jurisdiction restrictions: Some frameworks are EU-only (GDPR, DORA, MiCA), some US-only (SOX, HIPAA, GLBA), some are global (ISO 27001, PCI-DSS). The jurisdiction allowlist in the manifest defines where the agent operates — different agent personas for different jurisdictions is the clean solution, rather than one agent that tries to operate everywhere.
The Framework Evidence Layer
In the manifest builder, each selected framework generates a set of framework evidence questions. For a global enterprise with 12 frameworks, that's 60–80 questions. They're not all distinct — many share answers.
The framework evidence section of the manifest records which articles of which frameworks are covered by each policy field. This is the "traceability matrix" that compliance officers need: for each regulatory requirement, what control implements it, and what evidence shows the control is working?
For audit purposes, the compliance team produces a single document: the manifest (what we do), the interaction records (what actually happened), and the evidence bundle (proof the controls worked). The mapping from regulatory requirement to manifest field to audit evidence is explicit.
Practical Advice for Global Enterprises
Start with the strictest requirement in each category. For retention: SOX's 7 years. For notification: DORA's 4 hours. For human oversight: EU AI Act's structural requirement. You get credit across all frameworks for meeting the highest bar.
Deploy per-jurisdiction agent personas. A US financial agent (SOX + HIPAA + AML + GLBA) has different jurisdiction constraints than the EU financial agent (GDPR + MiFID II + DORA). One manifest per deployment context — not one manifest trying to handle all jurisdictions simultaneously.
Run the qualification funnel annually. Frameworks get added (India DPDP enforcement starts mid-2026), thresholds change (PIPL 1M individual limit), and your business context changes. The four-question funnel should be re-run each year as part of your compliance refresh.
