|
| enum class | signet::forge::ReportFormat { signet::forge::JSON
, signet::forge::NDJSON
, signet::forge::CSV
} |
| | Output serialization format for compliance reports. More...
|
| |
| enum class | signet::forge::TimestampGranularity { signet::forge::NANOS
, signet::forge::MICROS
, signet::forge::MILLIS
} |
| | Timestamp granularity for MiFID II RTS 24 Art.2(2) compliance. More...
|
| |
| enum class | signet::forge::ComplianceStandard { signet::forge::MIFID2_RTS24
, signet::forge::EU_AI_ACT_ART12
, signet::forge::EU_AI_ACT_ART13
, signet::forge::EU_AI_ACT_ART19
} |
| | Which regulatory standard a compliance report satisfies. More...
|
| |
| enum class | signet::forge::risk::RiskCheckResult : int32_t { signet::forge::risk::PASS = 0
, signet::forge::risk::REJECT = 1
, signet::forge::risk::THROTTLE = 2
} |
| | Pre-trade risk check result. More...
|
| |
| enum class | signet::forge::risk::RiskRejectReason : int32_t {
signet::forge::risk::NONE = 0
, signet::forge::risk::PRICE_COLLAR = 1
, signet::forge::risk::MAX_ORDER_SIZE = 2
, signet::forge::risk::MAX_DAILY_VOLUME = 3
,
signet::forge::risk::MAX_MESSAGE_RATE = 4
, signet::forge::risk::INSTRUMENT_BANNED = 5
, signet::forge::risk::CUSTOM = 99
} |
| | Reason for a risk check rejection. More...
|
| |
| enum class | signet::forge::gdpr::DataClassification : int32_t {
signet::forge::gdpr::PUBLIC = 0
, signet::forge::gdpr::INTERNAL = 1
, signet::forge::gdpr::PERSONAL = 2
, signet::forge::gdpr::SENSITIVE = 3
,
signet::forge::gdpr::PSEUDONYMIZED = 4
, signet::forge::gdpr::ANONYMIZED = 5
} |
| | Data classification levels for GDPR compliance. More...
|
| |
| enum class | signet::forge::dora::AssetCriticality : int32_t { signet::forge::dora::LOW = 0
, signet::forge::dora::MEDIUM = 1
, signet::forge::dora::HIGH = 2
, signet::forge::dora::VITAL = 3
} |
| | ICT asset criticality level per DORA Art. 8(1). More...
|
| |
| enum class | signet::forge::dora::BackupStatus : int32_t {
signet::forge::dora::PENDING = 0
, signet::forge::dora::IN_PROGRESS = 1
, signet::forge::dora::COMPLETED = 2
, signet::forge::dora::FAILED = 3
,
signet::forge::dora::VERIFIED = 4
} |
| | Backup verification status. More...
|
| |
| enum class | signet::forge::dora::KeyState : int32_t {
signet::forge::dora::PRE_ACTIVATION = 0
, signet::forge::dora::ACTIVE = 1
, signet::forge::dora::DEACTIVATED = 2
, signet::forge::dora::COMPROMISED = 3
,
signet::forge::dora::DESTROYED = 4
} |
| | Key lifecycle state per NIST SP 800-57. More...
|
| |
| enum class | signet::forge::dora::IncidentSeverity : int32_t { signet::forge::dora::LOW = 0
, signet::forge::dora::MEDIUM = 1
, signet::forge::dora::HIGH = 2
, signet::forge::dora::CRITICAL = 3
} |
| | ICT incident severity per DORA Art. 15. More...
|
| |
| enum class | signet::forge::dora::IncidentCategory : int32_t {
signet::forge::dora::OPERATIONAL = 0
, signet::forge::dora::SECURITY = 1
, signet::forge::dora::DATA_INTEGRITY = 2
, signet::forge::dora::CRYPTOGRAPHIC = 3
,
signet::forge::dora::THIRD_PARTY = 4
} |
| | ICT incident category per DORA Art. 10. More...
|
| |
| enum class | signet::forge::dora::ResilienceTestType : int32_t {
signet::forge::dora::FAULT_INJECTION = 0
, signet::forge::dora::SCENARIO_BASED = 1
, signet::forge::dora::STRESS_TEST = 2
, signet::forge::dora::RECOVERY_TEST = 3
,
signet::forge::dora::TLPT = 4
} |
| | Resilience test type. More...
|
| |
| enum class | signet::forge::dora::ResilienceTestResult : int32_t { signet::forge::dora::PASS = 0
, signet::forge::dora::DEGRADED = 1
, signet::forge::dora::FAIL = 2
} |
| | Resilience test result. More...
|
| |
| enum class | signet::forge::dora::RiskLevel : int32_t {
signet::forge::dora::NEGLIGIBLE = 0
, signet::forge::dora::LOW = 1
, signet::forge::dora::MEDIUM = 2
, signet::forge::dora::HIGH = 3
,
signet::forge::dora::CRITICAL = 4
} |
| | ICT risk level. More...
|
| |
| enum class | signet::forge::dora::AnomalyType : int32_t {
signet::forge::dora::LATENCY_SPIKE = 0
, signet::forge::dora::DECRYPTION_FAILURE = 1
, signet::forge::dora::CHAIN_BREAK = 2
, signet::forge::dora::UNUSUAL_IO = 3
,
signet::forge::dora::AUTH_FAILURE = 4
, signet::forge::dora::DATA_VOLUME_ANOMALY = 5
} |
| | Anomaly type for ICT monitoring. More...
|
| |
| enum class | signet::forge::dora::NotificationLevel : int32_t { signet::forge::dora::INFO = 0
, signet::forge::dora::WARNING = 1
, signet::forge::dora::ALERT = 2
, signet::forge::dora::CRITICAL = 3
} |
| | Notification severity level. More...
|
| |
| enum class | signet::forge::gdpr::PseudonymStrategy : int32_t { signet::forge::gdpr::HMAC_SHA256 = 0
, signet::forge::gdpr::RANDOM_TOKEN = 1
} |
| | Pseudonymization strategy. More...
|
| |
| enum class | signet::forge::eu_ai_act::AIRiskLevel : int32_t { signet::forge::eu_ai_act::MINIMAL = 0
, signet::forge::eu_ai_act::LIMITED = 1
, signet::forge::eu_ai_act::HIGH = 2
, signet::forge::eu_ai_act::UNACCEPTABLE = 3
} |
| | AI system risk classification per EU AI Act Art. 6. More...
|
| |
| enum class | signet::forge::eu_ai_act::LifecycleEventType : int32_t {
signet::forge::eu_ai_act::SYSTEM_START = 0
, signet::forge::eu_ai_act::SYSTEM_STOP = 1
, signet::forge::eu_ai_act::CONFIG_CHANGE = 2
, signet::forge::eu_ai_act::MODEL_SWAP = 3
,
signet::forge::eu_ai_act::ERROR_RECOVERY = 4
, signet::forge::eu_ai_act::HUMAN_OVERRIDE = 5
, signet::forge::eu_ai_act::KEY_ROTATION = 6
, signet::forge::eu_ai_act::DEPLOYMENT = 7
} |
| | System lifecycle event type. More...
|
| |
|
| bool | signet::forge::regulatory::validate_lei (const std::string &lei) |
| | Validate an LEI (Legal Entity Identifier) per ISO 17442.
|
| |
| bool | signet::forge::regulatory::validate_isin (const std::string &isin) |
| | Validate an ISIN (International Securities Identification Number) per ISO 6166.
|
| |
| bool | signet::forge::regulatory::validate_mic (const std::string &mic) |
| | Validate a MIC (Market Identifier Code) per ISO 10383.
|
| |
| PreTradeCheckResult | signet::forge::risk::check_order (const PreTradeRiskLimits &limits, double order_price, double reference_price, double order_notional, double daily_notional) |
| | Perform a pre-trade risk check on a proposed order.
|
| |
| bool | signet::forge::gdpr::requires_encryption (DataClassification c) |
| | Check if a classification level requires encryption under GDPR Art.
|
| |
| bool | signet::forge::gdpr::allows_pseudonymization (DataClassification c) |
| | Check if a classification level allows pseudonymization.
|
| |
| bool | signet::forge::dora::meets_rpo (const BackupPolicy &policy, int64_t last_backup_ns, int64_t now_ns) |
| | Check if a backup meets its RPO requirement.
|
| |
| bool | signet::forge::dora::needs_rotation (const KeyLifecycleRecord &record, int64_t now_ns) |
| | Check if a key needs rotation based on its crypto-period.
|
| |
| void | signet::forge::gdpr::pseudonymize_hmac (const uint8_t *key, size_t key_size, const uint8_t *value, size_t value_size, char *out, size_t out_size) |
| | Pseudonymize a value using HMAC-SHA256.
|
| |
| PolicyValidationResult | signet::forge::gdpr::validate_gdpr_policy (const std::vector< ColumnClassification > &classifications, const std::vector< std::string > &encrypted_columns) |
| | Validate that all PII-classified columns have encryption keys.
|
| |
| bool | signet::forge::gdpr::is_expired (const RetentionPolicy &policy, int64_t data_created_ns, int64_t now_ns) |
| | Check if data has exceeded its retention period.
|
| |
| bool | signet::forge::eu_ai_act::is_drifted (const DriftMetric &m) |
| | Check if a drift metric exceeds its threshold.
|
| |
| bool | signet::forge::mifid2::has_gaps (const CompletenessAttestation &att) |
| | Check if a reporting period has gaps.
|
| |