Certification

Risk Profiles

Continuum/AI defines four certification profiles with increasing control requirements based on data sensitivity and potential impact.

Profile summary

ProfileData AccessedPotential ImpactControlsValidation
EssentialPublic, internalLow9Self-assessment
StandardConfidentialMedium24Self-assessment with scan
ElevatedPII, sensitiveHigh39Internal audit
CriticalRegulated, financialSevere48Third-party audit

Control distribution by profile

DomainEssentialStandardElevatedCritical
GOV2345
IDN0234
AZN1245
DAT2456
VAL2455
EXE1445
OBS1256
INT0134
RES0134
SUP0134
Total9243948

Essential profile

Essential profile applies to experimental and development deployments with access limited to public and internal data. Nine controls establish baseline security posture including acceptable use policy, ownership assignment, least privilege, data classification, access restrictions, input sanitization, injection detection, process isolation, and action logging.

Standard profile

Standard profile applies to deployments accessing confidential data with medium impact potential. Twenty-four controls add agent inventory, identity verification, temporal constraints, encryption in transit, source verification, and session correlation.

Elevated profile

Elevated profile applies to deployments processing PII and sensitive data. Thirty-nine controls add risk assessment, credential management, action filtering, encryption at rest, content boundary enforcement, anomaly detection, approval workflows, and containment procedures.

Critical profile

Critical profile applies to deployments handling regulated and financial data. All forty-eight controls are required with independent third-party audit validation.

Previous
Certification model