Documentation Index
Fetch the complete documentation index at: https://docs.manthan.systems/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Organisations governing AI decisions today use one or more of five approaches. Each has genuine strengths. Each has specific limits. Understanding those limits is the starting point for choosing the right governance architecture. This page analyses each approach honestly — what it proves, what it cannot prove, and what the residual risk is.Approach 1 — Audit Logs
What it is
Every AI decision is written to a log. Logs are stored in a database, object storage, or SIEM. Auditors query the log to reconstruct what happened.What it proves
What it cannot prove
The residual risk
Logs are mutable. Anyone with database write access can alter a log record. Even append-only logs can be truncated or replaced at the storage layer. When a regulator asks “prove this decision followed your credit policy” — a log entry says the decision was X. It does not prove X was correct or unaltered.When it is sufficient
Audit logs are sufficient when:- The risk of log alteration is low (internal controls)
- The regulator accepts operational evidence
- No cryptographic proof is required
Approach 2 — Rule Engines
What it is
Business rules are codified in a rule engine. The AI system calls the rule engine with input signals. The rule engine evaluates rules and returns a decision. The decision is logged. Common implementations: decision tables, DMN, Drools, built-in rule engines in core banking systems.What it proves
What it cannot prove
The residual risk
Rule engines evaluate rules correctly. They do not produce cryptographic proof of the evaluation. The audit trail is: “the rule engine was called with these inputs and returned this decision.” This is operationally useful but not cryptographically provable. A sophisticated dispute could challenge:- Were these actually the inputs provided?
- Was this actually the policy version that was active?
- Could someone have changed the rule engine configuration?
When it is sufficient
Rule engines are the right tool for:- Real-time decision making at scale
- Complex business logic with many conditions
- Policy management with version control
Approach 3 — Model Monitoring
What it is
A monitoring layer observes AI model inputs and outputs over time. It detects drift, bias, and performance degradation across populations of decisions.What it proves
What it cannot prove
The residual risk
Model monitoring operates at the population level. It answers “is this model behaving correctly on average?” It cannot answer “was this specific decision correct?” When a borrower in Mumbai disputes their loan rejection, population-level statistics are not evidence. The regulator wants to know what happened in that specific case with those specific inputs. Model monitoring cannot answer this question for any individual decision.When it is sufficient
Model monitoring is essential for:- Detecting model degradation over time
- Ensuring fairness across demographic groups
- Triggering retraining when performance drops
- Regulatory reporting on model behaviour
Approach 4 — Blockchain
What it is
Decisions are recorded on a distributed ledger. Multiple validators confirm each record. Records are immutable once confirmed. Any party can verify any record using the public ledger.What it proves
What it cannot prove
The practical constraints
When it is the right choice
Blockchain is the right tool when:- Multiple organisations who do not trust each other need to agree on shared truth
- Records must be public and universally accessible
- Decentralisation is a requirement not a preference
- Latency requirements allow seconds not milliseconds
Blockchain and Parmana together
Parmana attestations can be published to a blockchain. This combines:- Parmana: millisecond governance proof, private, cheap
- Blockchain: immutable public record, multi-party verifiable
Approach 5 — Cryptographic Governance
What it is
Every AI decision produces a cryptographically signed attestation. The attestation binds the decision to the exact policy version, the exact inputs, and the exact runtime that produced it. Any party with the public key can verify any attestation independently — without access to the original system.What it proves
What it cannot prove
The honest limits
Cryptographic governance is strong software-layer proof. It does not extend to hardware execution or physical reality. To close remaining gaps:- Signal provenance: trace where inputs came from
- Source attestation: verify inputs were signed by the source
- TEE integration: hardware-proved execution
- Independent reconciliation: compare authorizations to outcomes
When it is the right choice
Cryptographic governance is appropriate when:- Individual decisions must be provably correct
- An independent party may need to verify any decision
- Regulators require non-repudiable audit evidence
- The same inputs must deterministically produce the same decision
- Decisions must be tamper-evident without blockchain infrastructure
Choosing the Right Approach
These approaches are not mutually exclusive. The right governance architecture for most regulated Indian fintechs combines several:The sequence for Indian regulated fintechs
Summary
| Approach | Tamper-evident | Per-decision proof | Independent verify | Real-time | Private |
|---|---|---|---|---|---|
| Audit logs | ❌ | ❌ | ❌ | ✅ | ✅ |
| Rule engines | ❌ | ❌ | ❌ | ✅ | ✅ |
| Model monitoring | ❌ | ❌ | ❌ | ✅ | ✅ |
| Blockchain | ✅ | ❌ | ✅ | ❌ | ❌ |
| Cryptographic governance | ✅ | ✅ | ✅ | ✅ | ✅ |