Back to Blog
Standards ComplianceCI/CDDevOpsBaselineAutomation

You're Already Non-Compliant. You Just Don't Know It Yet.

Josh Bahlman
March 2026
12 min read

Introducing CI/CD/CC: Continuous Compliance for the Standards-Driven Stack

Passing an audit doesn't mean you're compliant. It means you were ready that day.

Standards move weekly. Your code updates monthly. Drift starts the moment a specification changes and nobody catches it. By the time you find the gap, you're already in a fire drill.

This is a solved problem in software quality. It's unsolved in standards compliance. That's what CI/CD/CC fixes.

The category gap

Software engineering moved through predictable stages when it got serious about quality.

Manual testing gave way to automated CI. Periodic security reviews gave way to DevSecOps: security as a pipeline discipline, not an audit event. Each time, a quality concern that was handled manually and reactively got pulled into the build pipeline and made continuous.

Standards compliance still runs on manual review. The feedback loop is slow. The surface being tracked moves faster than any manual process can follow.

CI gave us build reliability. CD gave us release velocity. DevSecOps gave us continuous security. CI/CD/CC gives us continuous standards compliance.

Same pipeline. Same discipline. The missing step.

Where the gap actually lives

Passing an audit doesn't mean you're compliant. It means you have a GRC team that can get you through a process. Audits don't show high assurance for a sustained period. They show that you were ready on the day. The Statement of Applicability looks clean at the point-in-time. What about the 364 days between? Always check the SOA.

That gap. Between audit-ready and actually-compliant. That's where real risk lives.

Three approaches dominate. None of them close it.

The mailing list approach. Someone subscribes to working group updates, reads them when they get to them, and hopes the relevant changes make it into the codebase. This works until it doesn't. Usually discovered during an interop test or a failed validation.

The periodic review. Quarterly sweep. Teams look at the landscape, identify gaps, remediate. The problem: standards don't wait for your review cycle. The gap between specification and implementation is real, and it accumulates between reviews.

The consultant engagement. Bring someone in before certification. They find the gaps. You scramble. Repeat next quarter.

I say this as a recovering CISO. If anyone knows compliance pain, it's me and the teams I've worked with. The legacy gaps. The manual processes. The GRC scramble before every audit cycle. The surface moves too fast for any of it to hold.

Service providers especially. Too much time spent. Too much risk accepted. Having an ISO 27001 or SOC 2 cert doesn't give you cover if you're managing compliance the old way. That cert tells you what you looked like on a specific day. It says nothing about today. If you're the type of security person who thinks operational risk is operations' problem, stop reading. But if you're the type who loses sleep over the 364 days between audits, keep going.

Secure by risk acceptance is a lazy person's game.

All three approaches treat compliance as a point-in-time event. CI/CD/CC treats it as a continuous state.

Writing standards and implementing them are different skills

The people who write specifications are protocol architects, working group chairs, and vendor representatives. They optimise for correctness, completeness, and consensus. They're not thinking about your CI pipeline or your deployment schedule.

The people implementing those specifications are engineers under delivery pressure. They're reading a 200-page spec and making judgment calls about what's required, what's optional, and what can be deferred. Those calls accumulate. That's where drift starts.

Then there's a third group: the auditors. They know the framework. They know what a clean Statement of Applicability looks like. They often have no idea what the code actually does.

Three groups. Three different definitions of compliant. None of them talking to each other.

Standards expertise and implementation quality are orthogonal skills. A team can have deep standards knowledge and still ship non-compliant code, because knowing what a spec says and knowing whether your implementation matches it are different problems. One is a reading problem. The other is a continuous verification problem.

You shouldn't need standards experts embedded in your engineering team. The pipeline should do that work.

We built this for ourselves

KeyFlux operates at the dense end of the standards spectrum: digital identity infrastructure. W3C VC Data Model changes hit our credential pipeline. OpenID4VP revisions break our presentation protocols. eIDAS 2.0 implementing acts reshape our trust architecture. ISO 18013-5 amendments affect our mDoc issuance. SD-JWT encoding changes cascade through our selective disclosure flows.

We never tried to manage that surface manually. We knew what it would take. Anyone who's run a serious compliance program knows the mailing list approach fails, the quarterly review is already behind, and the consultant engagement is just paying to find out what you already suspected. We didn't want to repeat what passes for standard practice. We wanted to build something that was actually compliant, in any real definition of the word, from the start.

We don't have the luxury of sending someone to sit in OIDF working groups or W3C weekly calls. We shouldn't need to. The standards are excellent. Thousands of hours of expert consensus on how digital identity should work. We want to build to them. We don't need to be in the room where the sausage gets made. We need to know when the recipe changes.

So we built Baseline. Daily sync across 55 standards. Automated impact analysis against our own codebase. Continuous compliance enforcement before anything ships.

That order matters. This wasn't built to sell, then validated. It was built to survive, then offered. When compliance tooling comes from teams not subject to the same obligations, it optimises for reporting. When it comes from teams running under those obligations, it optimises for accuracy and speed.

We need it to be right. Fast. So does your team.

The surface moves whether you're watching or not

Digital identity is the extreme end of standards density: 55+ specifications across 10+ standards bodies, all moving independently, all interdependent. Take one thread:

OID4VCI draft updates credential_responsewallet rejects issuanceverifier fails validationcustomer sees an error

One change. One missed update. Downstream consequences across three services. And digital identity is just the example.

3GPP Release 18 alone spans dozens of work items across radio, core, and security working groups, each producing independent specification updates. EU AI Act standardisation work spans multiple overlapping ISO, CEN, and ETSI standards — staggered enforcement deadlines, each with their own compliance surface. ISO 21434 amendments affect automotive software compliance timelines. Any domain where specifications are the substrate has the same structural problem: the surface moves continuously and the tooling to track it doesn't exist.

The OIDF ran 11 interoperability events across 2025. The July OpenID4VCI test showed an 87% pass rate across 47 pairwise vendor tests. That's a 13% failure rate among teams actively trying to interoperate under controlled conditions. Common failure modes: incorrect credential_response structure, unsupported proof types, outdated encoding. Minor drift. Real consequences.

Digital identity is where Baseline started. AI governance is where it's already expanding. EU AI Act enforcement is live. GPAI documentation requirements are in effect. NIST AI RMF is the operational backbone for US-aligned deployments. Same problem, same architecture, different standards surface. Cybersecurity compliance regimes and telecom protocol standards are next. The pattern is identical wherever specifications are the substrate.

Nobody is watching all the edges of this graph at once. Most teams are watching the nodes they know about and hoping the rest stays stable. It doesn't.

How Baseline works

Baseline monitors the full standards surface and turns spec changes into engineering tasks. Four layers, each building on the one before it.

1

Monitor

Daily sync across 76 feeds from every major standards body.

2

Analyze

AI-powered impact analysis against your connected repositories.

3

Enforce

Compliance scans scoring each repository 0–100 against relevant standards.

4

Gate

Pipeline integration – non-compliant merges don’t ship.

Monitor

The Standards Monitor runs daily across 76 feeds: GitHub repositories and RSS sources from every major standards body. Full historical backfill. Every release, draft revision, and tagged commit across all 55 standards, classified by severity:

  • Breaking: backwards-incompatible changes: field removals, protocol changes, deprecated flows
  • Significant: new requirements, security fixes, normative changes that need attention
  • Informational: editorial corrections, typo fixes, documentation updates

Breaking changes surface immediately. Editorial updates don't generate noise.

Analyze

Monitoring tells you what changed. Analysis tells you what it means for your code.

When a standard update lands, Baseline runs AI-powered impact analysis against your connected repositories. Not a generic summary of the spec change. Specific to your codebase: affected components, risks if ignored, new capabilities enabled, and a step-by-step implementation plan with exact file paths, function names, and code changes.

For a small team, this turns a multi-day research task into a prioritized work queue. For multi-service architectures, Release Intelligence maps the dependency chain before you find out the hard way.

Enforce

Analysis tells you what to fix. Enforcement tells you whether you've fixed it.

Compliance scans run against your connected repositories, scoring each one 0–100 against the relevant standards. Findings point to exact file paths and line numbers, with rule IDs that trace back to specific clauses in the specification. For example:

Rule: OID4VP-3.2.1
Issue: presentation_definition requires input_descriptors array
File: verifier/service/presentation.go
Line: 118

Not a document review. A code finding. Scans run continuously. Your compliance posture is always current, always quantified, always traceable to specific code.

Gate

This is where Baseline meets your pipeline.

Every push triggers a compliance check. The result is a score:

  • 80+: Pass.
  • 60–79: Warning. You're drifting.
  • Below 60: Fail. Immediate remediation required.

Your pipeline already has Continuous Integration. It already has Continuous Deployment. Baseline adds the missing step: Continuous Compliance. CI/CD/CC.

Non-compliant merges don't ship. The standard has changed. Your code either meets it or it doesn't. That determination happens at the pipeline, not the audit table.

The tax you're already paying

Somewhere on your team, an engineer is reading working group mailing lists, cross-referencing drafts, and trying to work out whether the latest revision affects your implementation. That person is not shipping product. And they're probably the one you can least afford to pull off delivery.

That's the real cost. Not the fine. Not the failed audit. The slow, invisible drag on your best people.

For a team of 3–5 engineers, tracking even the core specifications in your domain is easily 10–20 hours per month just on awareness, before any remediation starts. And that's assuming nothing falls through the cracks, which it always does when the process is manual.

The real cost isn't the monitoring. It's the rework when you discover non-compliance late. A breaking change caught the day it lands is a focused, planned task. The same change discovered three months later, during interop testing, during a customer integration, during a regulatory review, is a fire drill. Unplanned work that disrupts your roadmap, delays your deliverables, and damages your credibility.

Baseline automates the monitoring, runs the impact analysis, and enforces at the gate. The engineer stays on delivery. The compliance posture stays current. The audit trail writes itself.

Get access

Baseline is part of the KeyFlux BASELINE stack. GitHub Marketplace integration is coming soon for native CI/CD pipeline support. Other integrations are available on request.

We're working directly with teams who are serious about continuous compliance, and with partners who want to build out CC capabilities for their own domain-specific use cases.

If you're building in a standards-dense environment and want to talk about what that looks like for your stack, reach out at [email protected].

We built it for digital identity because that's where we operate. But the model is the same wherever specifications are the substrate. If your domain has standards that move, you have drift. Passing an audit doesn't mean you're compliant. It means you were ready that day.

The question is whether you find the gap at the merge or at the moment it costs you.