api.rulesgraph.com · v1 · operational

The compliance graph, callable from anywhere.

Public REST API for the typed graph of cybersecurity compliance. Six endpoints, full provenance, free tier of 600 requests per minute. Build the integration in under an hour.

Quickstart

bash
# List frameworks in the graph
curl -H "Authorization: Bearer $RG_KEY" \
  "https://api.rulesgraph.com/v1/frameworks"

# Walk cross-mappings from a SOC 2 control
curl -H "Authorization: Bearer $RG_KEY" \
  "https://api.rulesgraph.com/v1/controls/soc2-cc6.1/maps_to"

# Get every revision of ISO/IEC 27001
curl -H "Authorization: Bearer $RG_KEY" \
  "https://api.rulesgraph.com/v1/revisions?framework=iso-27001"

Response shape

GET /v1/frameworks/iso-27001-2022
{
  "id": "iso-27001-2022",
  "name": "ISO/IEC 27001:2022",
  "publisher": "ISO/IEC",
  "layer": 1,
  "control_count": 93,
  "supersedes": "iso-27001-2013",
  "provenance": {
    "source_url": "https://iso.org/...",
    "fetched_at": "2026-04-12T03:14:22Z",
    "content_hash": "sha256:8f1b2..."
  }
}

MCP server

Plug RulesGraph into Claude Desktop, Cursor, Windsurf, or any MCP-compatible agent. The agent gets typed access to every control, framework, and cross-mapping in the graph.

claude_desktop_config.json
{
  "mcpServers": {
    "rulesgraph": {
      "url": "https://mcp.rulesgraph.com",
      "auth": { "bearer": "$RG_MCP_KEY" }
    }
  }
}

Rate limits

Free tier is 600 requests per minute on a sliding window. Every response carries the current quota in headers, so you can self-regulate without a probe call.

response headers
X-RateLimit-Limit:     600
X-RateLimit-Remaining: 593
X-RateLimit-Reset:     2026-05-23T11:48:00Z

Higher tiers for GRC platforms and enterprise integrations. Email contact@rulesgraph.com.