Create an account
Sign up at the Yggdrasil platform. You’ll be prompted to create an account using email authentication.After signing in, you’ll land on the dashboard where you can view your scan history and compliance trends.
Start a new audit
Click New Audit from the dashboard or navigate to
/audit/new.You’ll be prompted to:- Name your audit (e.g., “Q1 2026 AML Review”)
- Select a policy framework to scan against
Choose a prebuilt policy
Yggdrasil includes three production-ready policy frameworks:
- AML / FinCEN — 11 rules covering currency transaction reports, structuring detection, velocity limits, dormant account reactivation, round amount patterns, and suspicious activity thresholds
- GDPR — 14+ rules for consent management, encryption requirements, data subject rights, third-country transfers, and processing records
- SOC2 — 5 trust principle rules covering Security, Availability, Confidentiality, Processing Integrity, and Privacy
Upload your dataset
Upload a CSV file containing the data you want to scan for compliance violations.Yggdrasil will:
- Detect the schema automatically
- Suggest column mappings using AI (e.g., mapping
"tx_amount"to the expected"amount"field) - Display a preview of your data
The platform supports up to 50,000 rows per scan. Larger datasets will be sampled automatically.
Review and confirm column mappings
Before the scan runs, you’ll see the suggested column mappings:You must approve these mappings. No data transformations happen behind the scenes — transparency is a core design principle.If the AI mapping is incorrect, you can manually adjust it before confirming.
Review rules (optional)
Before running the scan, you can review the rules that will be evaluated against your data.Each rule displays:
- Rule name and severity (CRITICAL, HIGH, MEDIUM)
- Policy excerpt — the exact regulatory clause it enforces
- Conditions — the compound boolean logic (AND/OR trees) used to detect violations
Run the compliance scan
Click Start Scan.The deterministic rule engine will:
- Normalize your CSV data (type coercion, field mapping)
- Evaluate each active rule against your records
- Apply confidence scoring (rule quality + signal specificity + statistical anomaly detection + Bayesian precision)
- Generate violations with full explainability
The rule engine is deterministic — no ML models run in the enforcement loop. This makes results reproducible and audit-ready.
Review violations
After the scan completes, you’ll see a dashboard with:
- Compliance score (0–100) based on violation count and severity
- Violations by severity — CRITICAL, HIGH, and MEDIUM counts
- Violations by rule — which rules triggered the most findings
- Violations by account — accounts with the most compliance issues
- The policy excerpt that was violated
- The matched conditions that triggered the rule
- The evidence grid — the exact field values from your data that caused the violation
- A natural-language explanation (generated from deterministic templates, not LLM calls)
Approve or dismiss violations
For each violation, you can:Rules that produce false positives lose confidence over time. Rules that catch real issues gain confidence. Your reviews make the next scan better.
- Approve — Mark as a confirmed true positive
- Dismiss as false positive — Mark as incorrect
Next Steps
Configuration
Learn about environment variables and deployment settings
API Reference
Explore the REST API for programmatic access