Compliance
How Shadow Mode De-Risks Your DPDP Compliance Pilot
Shadow mode lets you test DPDP compliance controls on real traffic without affecting production — validate your PII detection before switching to enforcement mode.
What Is Shadow Mode?
Shadow mode is an operating mode for compliance controls where the system observes and logs policy violations but does not block or modify traffic. It's deployed in parallel with production traffic — every request is evaluated against DPDP policies, violations are logged and alerted, but the request proceeds unchanged.
This is the safe way to pilot DPDP compliance controls: validate your PII detection accuracy, tune your policy thresholds, and build confidence in the system before switching to enforcement mode (where violating requests are blocked or redacted).
Why Shadow Mode Matters for DPDP Compliance
Switching straight to enforcement mode on a production AI application without testing is risky. False positives in PII detection (e.g., a product code that looks like a PAN number) will block legitimate requests and break your application. False negatives (PII that slips through detection) won't be visible until a breach occurs.
Shadow mode exposes both problems before they cause outages or compliance incidents. After running shadow mode for 48–72 hours, you'll have real data on: how many requests contain PII, which PII types are most common, whether any of your legitimate traffic triggers false positives, and what the performance impact of scanning is on your p95 latency.
Running a Shadow Mode Pilot with CrewCheck
In CrewCheck, enable shadow mode on your policy pack: navigate to Policies → India PII Pack → Mode → Shadow. All traffic is now evaluated but not modified. The dashboard shows a real-time feed of detected PII types, their frequency, and the sessions that triggered them.
After 48–72 hours of shadow mode data, review: (1) the false positive list — requests flagged as containing PII that actually don't (often product codes, order IDs, or internal reference numbers that match PII patterns), (2) the true positive list — actual PII detected in real user traffic (this is your compliance gap you need to close), (3) latency impact — the p95 latency delta with scanning enabled vs. disabled.
Tuning Before Enforcement
After reviewing shadow mode data, create exception rules for known false positives: 'skip Aadhaar detection in prompt segments matching the pattern ORDER-\d{12}'. This preserves detection accuracy while eliminating operational noise.
Once your false positive rate is below 0.1% (a reasonable threshold for enforcement), switch to enforcement mode. At this point, the system will automatically redact or block PII-containing requests according to your configured policy — and you have evidence that it won't break your production workflows.
Compliance operational checklist
How Shadow Mode De-Risks Your DPDP Compliance Pilot should be reviewed as an operating control, not only as a reference article. The minimum checklist is a data inventory, a stated processing purpose, owner approval, PII detection at the AI boundary, redaction or tokenisation where possible, retention limits, vendor transfer records, and a tested user-rights workflow. This checklist gives engineering and compliance teams a shared language for deciding what must be blocked, what can be allowed in shadow mode, and what needs human review before production release.
For AI systems, the review should include prompts, retrieved context, tool call arguments, model responses, logs, traces, analytics events, exports, and support attachments. Many incidents happen because teams scan only the visible form field while sensitive data moves through background context or observability tooling. CrewCheck's recommended pattern is to place the scanner at the request boundary, record the policy version, and keep audit evidence that shows which identifiers were detected and what action was taken.
A practical rollout starts with representative samples from production-like traffic. Run a DPDP scan, sort findings by identifier sensitivity and blast radius, fix Aadhaar, PAN, financial, health, children's, and precise-location exposure first, then move to consent wording, retention, deletion, and vendor review. Use shadow mode when false positives could disrupt users, and promote to enforcement only after the exceptions have owners and expiry dates.
This page is educational and should be paired with legal review for final policy interpretation. The operational proof should still come from repeatable evidence: scanner results, audit exports, pull-request checks, policy configuration, and a documented owner for the workflow. That combination is what makes the content useful during buyer diligence, board review, regulatory questions, or an incident investigation.
Related pages
Check your own workflow
Run a free DPDP scan before this risk reaches production.
Scan prompts, logs, documents, and API payloads for Indian PII exposure, missing redaction, and audit gaps. Backlinks: learn hub, developer docs, pricing, and the DPDP scanner.