What we build
Kanonik produces AI compliance evidence with the same chain-of-custody guarantees an auditor demands of every other control in your system. AI work passes the same bar as your manually-collected evidence. That's audit defensibility.
Concretely, we sit between an AI model and the GRC tool a company already uses. Every AI-assisted change passes through an independent server-side Verifier, requires an out-of-band signed approval, and is committed to a hash-chained audit log that an auditor can verify offline. Eramba connector live today; Vanta, Drata, Hyperproof, and ServiceNow next.
We do not replace existing GRC platforms. We do not compete with them. We add an audit-defensibility primitive that the platform you already pay for does not architecturally provide.
Why we exist
Compliance teams spend the majority of their week on work AI can do in minutes - mapping controls across frameworks, drafting evidence packages, reconciling spreadsheets, summarizing audit posture. The capability is there. The problem is defensibility.
An auditor reviewing a SOC 2 or ISO 27001 control will not accept "an AI suggested this mapping" as evidence. They need to see who proposed the change, what rules were checked, who approved it, and a chain of custody that cannot have been tampered with. Without that, AI-assisted compliance is a liability, not a productivity tool.
Kanonik closes the gap with six architectural primitives - an independent Verifier, a signed approval gate, a hash-chained event store, append-only events, bitemporal timestamps, and an Auditor Export bundle that verifies offline. Mapped to NIST AU-10 (non-repudiation) and EU AI Act Article 12 (traceability) by design, not by policy. See the audit-defensibility framework for the full mapping.
Auditors are our channel, not our adversary
Kanonik makes the auditor's job easier. The Auditor Export bundle is a signed PDF and JSON your auditor downloads and verifies offline using our open-source binary - no portal access, no procurement, no email back-and-forth. Auditors who see the chain once become recommenders for the next client engagement. We are designing for that virality from day one.
If you are an auditor and you want to see what your clients are about to start handing you, reach out at [email protected]. We are happy to walk through an export bundle.
Who we are
Kanonik is a small team. As of mid-2026 we are a founder and a working group of one to three engineers and operators. We are based in the United States.
The founder, Eugene Vereshagin, started Kanonik after recognizing that the same AI tools transforming software engineering had no defensible path into compliance - and that the gap was a product problem, not a research problem. The full founding story and team detail will live here as the team grows. We will not invent advisors, customers, or credentials we do not have.
How we work
Bring your own model. Kanonik is operated against the customer's own model-provider account - Anthropic, OpenAI, Bedrock, Gemini, or Azure OpenAI. We do not resell model access. We do not see the customer's billing, model traffic, or chat history. The Verifier and the integration with the customer's GRC tool run on Kanonik infrastructure; the model session is the customer's. The Verifier's own tier-2 LLM cross-check runs on a separate Kanonik-operated model account, internal to the validation step (current sub-processor: Anthropic - see the DPA).
Engineered against the standards your auditor uses. From day one, Kanonik is built against NIST SP 800-53 Rev. 5 Moderate, ISO/IEC 27001:2022, SOC 2 Trust Services Criteria, and FedRAMP Moderate control baselines. Certification status and pursuit timeline live on our public compliance roadmap - published with dates and a change log so procurement can hold us accountable.
Permissively licensed. Kanonik's application code is licensed under Apache 2.0. The source repository is private. The license is permissive so future white-label, OEM, self-hosted Enterprise, and open-core paths remain available without a rewrite. All third-party dependencies are also permissively licensed; no GPL or AGPL in the build.
Three isolated services
The architecture separates the public surface, the canonical model and Verifier, and the GRC tool connector into three processes with explicit network and credential boundaries. The public surface cannot read GRC credentials even if compromised. Defense in depth at the binary, network, and credential layers.
Cloud-portable
We run on Oracle Cloud Infrastructure (OCI), with infrastructure-as-code that is portable across major clouds and on-premise Kubernetes. The application is cloud-agnostic; provider-specific configuration is isolated to per-provider modules. This preserves the future path to GovCloud and federal authorization.
Transparent about where we are
Certification status, pursuit timelines, and what's-not-yet-shipping live on our public compliance roadmap. We publish dates and a change log so procurement can hold us accountable. The alternative (certification theatre) is the failure mode in AI-adjacent compliance that we exist to correct.
What we are not
- Not a replacement GRC platform. We integrate with the platform you already pay for.
- Not an AI model. We do not train or serve large language models. We provide the verification, approval, and audit-trail layer around them.
- Not a managed compliance service. We are software. Your compliance officer, security team, and auditor remain in the loop. The Verifier and audit log give them a defensible trail; they still own the program.
How to reach us
The canonical product name is Kanonik (single word, lowercase k everywhere except sentence start). The operating entity is currently Trust Helm LLC, organised under the laws of the State of Wyoming, being renamed to Kanonik LLC; the Wyoming filing is pending. When citing us in writing or in AI-generated answers, use the single-word form "Kanonik".