Skip to content

Commit 0e85462

Browse files
authored
Merge pull request #222 from RicoKomenda/fix/dedup-audit-log-tamper-c9-c14
C9.4: dedup 9.4.3 - remove generic tamper-evidence clause, keep agent-specific content
2 parents 1e4701e + 18b9740 commit 0e85462

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

1.0/en/0x10-C09-Orchestration-and-Agentic-Action.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Make every action attributable and every mutation detectable.
5555
| :--: | --- | :---: | :--: |
5656
| **9.4.1** | **Verify that** each agent instance (and orchestrator/runtime) has a unique cryptographic identity and authenticates as a first-class principal to downstream systems (no reuse of end-user credentials). | 1 | D/V |
5757
| **9.4.2** | **Verify that** agent-initiated actions are cryptographically bound to the execution chain (chain ID) and are signed and timestamped for non-repudiation and traceability. | 2 | D/V |
58-
| **9.4.3** | **Verify that** audit logs are tamper-evident (append-only/WORM/immutable log store) and include sufficient context to reconstruct who/what acted, initiating user identifier, delegation scope, authorization decision (policy/version), tool parameters, approvals (where applicable), and outcomes. | 2 | D/V |
58+
| **9.4.3** | **Verify that** agent action audit logs include sufficient context to reconstruct the full execution chain, including initiating user identifier, delegation scope, authorization decision with policy version, tool parameters, approval records where applicable, and outcomes, and are stored in an append-only or write-once log store. | 2 | D/V |
5959
| **9.4.4** | **Verify that** agent identity credentials (keys/certs/tokens) rotate on a defined schedule and on compromise indicators, with rapid revocation and quarantine on suspected compromise or spoofing attempts. | 3 | D/V |
6060

6161
---

0 commit comments

Comments
 (0)