Compliance & Audit API

Generate compliance attestation reports and export audit logs via the API.

Access compliance reports and audit logs programmatically for regulatory submissions and internal reviews.

Compliance Report

GET /api/compliance/{releaseId}/report

Scope: compliance:read

Generates an HTML compliance attestation report for a release. The report covers:

  • EU Cyber Resilience Act (CRA) requirements
  • US Executive Order 14028/14144 requirements
  • NIST SSDF (SP 800-218) attestation checklist
  • Product and release information
  • SBOM details and component inventory
  • Vulnerability scan results and disposition summary
  • VEX document status
  • SLA policy compliance

The HTML output is suitable for printing to PDF.

Example:

curl -H "Authorization: Bearer cvk_YOUR_KEY" \
  -o compliance-report.html \
  https://cis.cveium.com/api/compliance/{release-id}/report

Response headers:

HeaderValue
Content-Typetext/html; charset=utf-8

Audit Log Export

GET /api/audit/export

Scope: audit:read

Exports audit log entries as a CSV file. Returns up to 10,000 rows.

Query parameters

ParameterTypeRequiredDescription
accountIduuidYesAccount ID (must match API key's account)
entityTypestringNoFilter by entity type (e.g. product, release, vex_document)
actionstringNoFilter by action (e.g. create, update, submit, approve, publish)
startDatedatetimeNoInclude logs from this timestamp (ISO 8601)
endDatedatetimeNoInclude logs up to this timestamp (ISO 8601)

CSV columns

ColumnDescription
timestampWhen the action occurred
actionThe action performed
entity_typeType of entity affected
entity_idID of the entity
entity_nameName of the entity
actor_emailEmail of the user or service account
actor_nameDisplay name of the actor
changesJSON summary of what changed

Example:

curl -H "Authorization: Bearer cvk_YOUR_KEY" \
  -o audit-log.csv \
  "https://cis.cveium.com/api/audit/export?accountId=YOUR_ACCOUNT_ID&startDate=2026-01-01T00:00:00Z&action=publish"

Use cases

  • Regulatory audits: Provide a complete trail of all disclosure activities
  • Internal reviews: Track who made triage decisions and when
  • Compliance evidence: Demonstrate timely response to new vulnerabilities
  • Change tracking: Monitor product and release modifications