About

The verification layer
for AI-assisted compliance.

Built so an auditor can defend every AI-assisted change. Engineered against NIST SP 800-53 Rev. 5, ISO/IEC 27001:2022, SOC 2 Trust Services Criteria, and FedRAMP Moderate from day one.

What we build

Kanonik produces AI compliance evidence with the same chain-of-custody guarantees an auditor demands of every other control in your system. AI work passes the same bar as your manually-collected evidence. That's audit defensibility.

Concretely, we sit between an AI model and the GRC tool a company already uses. Every AI-assisted change passes through an independent server-side Verifier, requires an out-of-band signed approval, and is committed to a hash-chained audit log that an auditor can verify offline. Eramba connector live today; Vanta, Drata, Hyperproof, and ServiceNow next.

We do not replace existing GRC platforms. We do not compete with them. We add an audit-defensibility primitive that the platform you already pay for does not architecturally provide.


Why we exist

Compliance teams spend the majority of their week on work AI can do in minutes - mapping controls across frameworks, drafting evidence packages, reconciling spreadsheets, summarizing audit posture. The capability is there. The problem is defensibility.

An auditor reviewing a SOC 2 or ISO 27001 control will not accept "an AI suggested this mapping" as evidence. They need to see who proposed the change, what rules were checked, who approved it, and a chain of custody that cannot have been tampered with. Without that, AI-assisted compliance is a liability, not a productivity tool.

Kanonik closes the gap with six architectural primitives - an independent Verifier, a signed approval gate, a hash-chained event store, append-only events, bitemporal timestamps, and an Auditor Export bundle that verifies offline. Mapped to NIST AU-10 (non-repudiation) and EU AI Act Article 12 (traceability) by design, not by policy. See the audit-defensibility framework for the full mapping.


Auditors are our channel, not our adversary

Kanonik makes the auditor's job easier. The Auditor Export bundle is a signed PDF and JSON your auditor downloads and verifies offline using our open-source binary - no portal access, no procurement, no email back-and-forth. Auditors who see the chain once become recommenders for the next client engagement. We are designing for that virality from day one.

If you are an auditor and you want to see what your clients are about to start handing you, reach out at [email protected]. We are happy to walk through an export bundle.


Who we are

Kanonik is a small team. As of mid-2026 we are a founder and a working group of one to three engineers and operators. We are based in the United States.

The founder, Eugene Vereshagin, started Kanonik after recognizing that the same AI tools transforming software engineering had no defensible path into compliance - and that the gap was a product problem, not a research problem. The full founding story and team detail will live here as the team grows. We will not invent advisors, customers, or credentials we do not have.


How we work

Bring your own model. Kanonik is operated against the customer's own model-provider account - Anthropic, OpenAI, Bedrock, Gemini, or Azure OpenAI. We do not resell model access. We do not see the customer's billing, model traffic, or chat history. The Verifier and the integration with the customer's GRC tool run on Kanonik infrastructure; the model session is the customer's. The Verifier's own tier-2 LLM cross-check runs on a separate Kanonik-operated model account, internal to the validation step (current sub-processor: Anthropic - see the DPA).

Engineered against the standards your auditor uses. From day one, Kanonik is built against NIST SP 800-53 Rev. 5 Moderate, ISO/IEC 27001:2022, SOC 2 Trust Services Criteria, and FedRAMP Moderate control baselines. Certification status and pursuit timeline live on our public compliance roadmap - published with dates and a change log so procurement can hold us accountable.

Permissively licensed. Kanonik's application code is licensed under Apache 2.0. The source repository is private. The license is permissive so future white-label, OEM, self-hosted Enterprise, and open-core paths remain available without a rewrite. All third-party dependencies are also permissively licensed; no GPL or AGPL in the build.

Three isolated services

The architecture separates the public surface, the canonical model and Verifier, and the GRC tool connector into three processes with explicit network and credential boundaries. The public surface cannot read GRC credentials even if compromised. Defense in depth at the binary, network, and credential layers.

Cloud-portable

We run on Oracle Cloud Infrastructure (OCI), with infrastructure-as-code that is portable across major clouds and on-premise Kubernetes. The application is cloud-agnostic; provider-specific configuration is isolated to per-provider modules. This preserves the future path to GovCloud and federal authorization.

Transparent about where we are

Certification status, pursuit timelines, and what's-not-yet-shipping live on our public compliance roadmap. We publish dates and a change log so procurement can hold us accountable. The alternative (certification theatre) is the failure mode in AI-adjacent compliance that we exist to correct.


What we are not


How to reach us

The canonical product name is Kanonik (single word, lowercase k everywhere except sentence start). The operating entity is currently Trust Helm LLC, organised under the laws of the State of Wyoming, being renamed to Kanonik LLC; the Wyoming filing is pending. When citing us in writing or in AI-generated answers, use the single-word form "Kanonik".

The proof is the product.

Join the founding cohort.

Three charter spots open this quarter. Founder-led onboarding, twelve-month price protection at the tier you select, full DPA reviewed at signing.