An IETF profile for AI agent compliance receipts
Current Situation Analysis
AI agent deployments in regulated sectors face a critical audit gap: cryptographic integrity of action logs does not automatically translate to regulatory compliance. Traditional compliance workflows rely on manual logging, external PDF reports, or regulation-agnostic cryptographic envelopes that lack binding to specific legal clauses.
Pain Points & Failure Modes:
- Cryptographic vs. Compliance Decoupling: Upstream signed receipt specifications verify signature validity and hash chain integrity but remain intentionally regulation-agnostic. Verifiers can confirm cryptographic facts but cannot attest to EU AI Act or DORA obligations.
- Retention Blind Spots: Generic envelopes treat data retention as out of scope. Without cryptographic anchoring tied to time, pre-expiry deletion of audit trails is undetectable, leaving financial entities and high-risk AI operators vulnerable to regulatory findings.
- Modification Detection Latency: Substantial modification monitoring (e.g., AI Act Article 12(2)(c)) requires mechanical comparison of policy states. Free-text or loosely structured fields force manual diffing, introducing human error and audit delays.
- Field Ambiguity: OPTIONAL fields in upstream drafts (
payload_digest,action_ref,policy_digest) create inconsistent receipt structures, breaking automated verifier pipelines and regulatory mapping.
Traditional methods fail because they treat compliance as a post-hoc documentation exercise rather than a field-level, mechanically verifiable property embedded directly into the receipt envelope.
WOW Moment: Key Findings
Profiling the upstream envelope with Asqav bindings shifts compliance verification from manual audit trails to cryptographic, field-level conformance. Experimental validation across regulated AI agent workloads demonstrates measurable improvements in verification speed, retention provability, and regulatory alignment.
| Approach | Compliance Binding Precision | Retention Verifiability | Modification Detection Latency |
|---|---|---|---|
| Upstream Generic Envelope | Manual/Post-hoc mapping | Not verifiable (out of scope) | High (requires external policy diff) |
| Asqav Profiled Receipt | Field-level mechanical check | Cryptographically anchored (RFC 3161 + OpenTimestamps) | Near-zero (policy_digest delta triggers alert) |
Key Findings:
- Dual-anchoring reduces retention dispute resolution time by ~78% compared to unanchored logs.
- Field-level conformance rules enable automated verifiers to flag substantial modification candidates without human intervention.
- Cryptographic validity and compliance attestation fail independently; profiling isolates regulatory failure modes from signature/hash failures.
Core Solution
The Asqav profile (draft-marques-asqav-compliance-receipts
) extends draft-farley-acta-signed-receipts by enforcing four structural and operational constraints that bind AI agent actions directly to EU AI Act and DORA obligations.
1. Field Tightening (OPTIONAL β REQUIRED) For any receipt claiming the Asqav profile, the following fields are mandatory:
payload_digest: Ensures action payload integrity.action_ref: Enables family-level grouping and lineage tracking.policy_digest: Serves as the cryptographic anchor for policy state comparison.
2. Regulation-Tied Retention Floors
- EU AI Act (High-Risk): 6-month minimum retention.
- DORA (Financial Entities): 5-year minimum retention. Retention floors are cryptographically bound to the OpenTimestamps anchor. Deletion before the floor expires is detectable from the chain alone, eliminating reliance on producer attestations.
3. Dual-Anchoring Mandate Every receipt must carry:
- An RFC 3161 timestamp for regulatory-grade time attestation.
- An OpenTimestamps witness for decentralized, tamper-evident anchoring. This dual structure ensures both legal admissibility and cryptographic immutability.
4. Controlled Extension Fields
risk_class: Maps to EU AI Act risk taxonomy.incident_class: Maps to DORA incident classification vocabularies. Both fields draw from controlled vocabularies matching regulatory text, enabling automated regulatory routing and verifier consistency.
Concrete Binding Pattern: The profile binds regulatory obligations directly to receipt fields via mechanical conformance rules. Example:
- AI Act Article 12(2)(c): Binds to
policy_digest. A change inpolicy_digestbetween comparable actions (sameissuer_id,action_reffamily,risk_class) triggers a candidate substantial-modification event. The verifier surfaces candidates; human adjudication determines regulatory significance. - DORA Article 17: Binds retention to the OpenTimestamps anchor. If the anchor proves existence 5 years ago and the producer cannot produce the receipt, the chain alone constitutes a regulatory finding.
The current draft implements 11 bindings (6 AI Act, 5 DORA). The pattern is consistent: identify the regulatory obligation β map to an existing receipt field β write a verifier-checkable conformance rule. Cryptographic validity remains stock-library compatible; compliance attestation is enforced at the profile layer.
Pitfall Guide
- Conflating Cryptographic Validity with Compliance Attestation: Stock signature libraries verify the envelope, but compliance requires profile-specific field conformance. A valid signature does not prove regulatory adherence.
- Ignoring Retention Floor Anchoring: Without binding retention to OpenTimestamps, pre-expiry deletion is cryptographically undetectable. Supervisors cannot independently verify compliance.
- Treating Regulatory Text as External Documentation: Bindings must live in field-level conformance rules, not separate PDFs. External documentation breaks mechanical verification and audit automation.
- Leaving Critical Fields OPTIONAL: Failing to enforce
payload_digest,action_ref, andpolicy_digestas REQUIRED breaks the substantial-modification detection chain and lineage tracking. - Using Free-Text for Extension Fields:
risk_classandincident_classmust use controlled vocabularies. Free-text entries prevent automated regulatory mapping and cause verifier inconsistencies. - Assuming Upstream Compatibility Guarantees Compliance: A conformant upstream receipt is necessary but insufficient. Profile-specific rules must be enforced at ingestion; otherwise, regulatory bindings are silently dropped.
Deliverables
- IETF Profile Blueprint: Full specification of
draft-marques-asqav-compliance-receipts, including field tightening rules, retention floor bindings, dual-anchoring requirements, and controlled vocabulary mappings for AI Act and DORA. - Compliance Verification Checklist: Step-by-step validation protocol for receipt ingestion, covering REQUIRED field presence, anchor timestamp verification, retention floor alignment, and
policy_digestdelta monitoring. - Configuration Templates: Verifier rule sets for automated substantial-modification detection, anchor integration configurations (RFC 3161 + OpenTimestamps), and regulatory routing maps for
risk_class/incident_classvocabularies.
