check_annex_controls
Evaluate an AI system against ISO 42001 Annex A controls to determine applicable controls and implementation status, producing a gap analysis for compliance documentation.
Instructions
Evaluate AI system against ISO 42001 Annex A controls.
Maps the system to all Annex A control objectives and evaluates which controls are applicable and their implementation status. Produces a gap analysis suitable for Statement of Applicability.
Args: system_description: Description of the AI system and its management. system_name: Name of the AI system. implemented_controls: Description of controls already implemented (free text or comma-separated control IDs). caller: Caller identifier for rate limiting. tier: Pricing tier ('free' or 'pro').
Returns: Annex A control evaluation with applicability and gap analysis.
Behavior: This tool generates structured output without modifying external systems. Output is deterministic for identical inputs. No side effects. Free tier: 10/day rate limit. Pro tier: unlimited. No authentication required for basic usage.
When to use: Use this tool when you need to assess, audit, or verify compliance requirements. Ideal for gap analysis, readiness checks, and generating compliance documentation.
When NOT to use: Do not use as a substitute for qualified legal counsel. This tool provides technical compliance guidance, not legal advice. Behavioral Transparency: - Side Effects: This tool is read-only and produces no side effects. It does not modify any external state, databases, or files. All output is computed in-memory and returned directly to the caller. - Authentication: No authentication required for basic usage. Pro/Enterprise tiers require a valid MEOK API key passed via the MEOK_API_KEY environment variable. - Rate Limits: Free tier: 10 calls/day. Pro tier: unlimited. Rate limit headers are included in responses (X-RateLimit-Remaining, X-RateLimit-Reset). - Error Handling: Returns structured error objects with 'error' key on failure. Never raises unhandled exceptions. Invalid inputs return descriptive validation errors. - Idempotency: Fully idempotent — calling with the same inputs always produces the same output. Safe to retry on timeout or transient failure. - Data Privacy: No input data is stored, logged, or transmitted to external services. All processing happens locally within the MCP server process.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| system_description | Yes | ||
| system_name | No | AI System | |
| implemented_controls | No | ||
| caller | No | anonymous | |
| tier | No | free | |
| api_key | No |