Skip to main content
Standards Support

Control Mappings

How Cryptographic Runtime Governance maps to NIST, SSDF, and CoSAI controls.

Important: References to NIST, CISA, SLSA, and other standards are informational mappings to support governance discussions. This is not certification, endorsement, or compliance advice.

Attested Intelligence™ is not affiliated with, approved by, or endorsed by NIST, CISA, or any standards body. These mappings are provided as a conceptual alignment guide only. Actual compliance depends on implementation context and auditor assessment.

Receipt Specification

Governance Receipt (15 fields)

FieldTypeDescription
receipt_idstringUnique receipt identifier (UUID)
receipt_versionstringSchema version ("1.0")
algorithmstringSigning algorithm identifier
timestampstringISO 8601 UTC timestamp
request_idstring | number | nullMCP request identifier (type preserved)
methodstringMCP method ("tools/call")
tool_namestringName of the tool being called
decisionstringPERMITTED or DENIED
reasonstringHuman-readable decision rationale
policy_referencestringSHA-256 hash of policy configuration
arguments_hashstringSHA-256 of canonical arguments (tri-state)
previous_receipt_hashstringChain link to previous receipt
gateway_idstringSigning gateway identifier
signaturestringEd25519 signature (128 hex chars)
public_keystringEd25519 public key (64 hex chars)

Canonicalization (RFC 8785)

All JSON serialization uses RFC 8785 JSON Canonicalization Scheme (JCS):

  • Object keys sorted by Unicode code point order
  • No whitespace outside string values
  • ECMAScript Number.toString() for number serialization (1.0 becomes 1)
  • Negative zero normalizes to positive zero
  • Array element order preserved (not sorted)

Signing and Chain Linking

SigningDigest: Canonical JSON of receipt WITHOUT the signature field. Ed25519 signature computed over these bytes.

ChainDigest: SHA-256 of canonical JSON of receipt WITH the signature field. Used as previous_receipt_hash in the next receipt.

arguments_hash tri-state: absent arguments = empty string, empty object = SHA-256("{}"), content = SHA-256(canonicalize(arguments)).

Evidence Bundle Format

An evidence bundle packages a receipt chain with Merkle proofs for offline verification:

FieldDescription
schema_versionBundle format version ("1.0")
bundle_idUnique bundle identifier (UUID)
algorithmAlgorithm suite ("Ed25519-SHA256-JCS")
generated_atISO 8601 bundle creation timestamp
gateway_idSigning gateway identifier
public_keyEd25519 public key (64 hex chars)
policy_referenceSHA-256 of policy configuration
receiptsOrdered array of GovernanceReceipt objects
merkle_rootSHA-256 Merkle root of receipt leaf hashes
merkle_proofsInclusion proofs for each receipt
offline_capableBoolean (always true)

Five-Step Verification

1. Algorithm check

Verify bundle and all receipts use "Ed25519-SHA256-JCS". Fail closed on unknown algorithms.

2. Receipt signatures

For each receipt: remove signature field, canonicalize, Ed25519 verify against public_key.

3. Chain integrity

First receipt: previous_receipt_hash = "". Each subsequent: previous_receipt_hash = SHA-256(canonical(prev receipt WITH signature)).

4. Merkle proofs

Walk each proof from leaf to root via sibling hashes. Constant-time compare computed root to bundle merkle_root.

5. Bundle consistency

Proof count = receipt count. Each proof's leaf_hash = SHA-256(canonical(receipt WITH signature)). Leaf indices sequential.

Algorithm Identifiers

IDSignatureHashCanonicalization
Ed25519-SHA256-JCSEd25519 (64-byte signature)SHA-256 (32-byte digest)RFC 8785 JCS

Additional algorithm suites may be defined in future versions. Verifiers must reject unknown algorithm identifiers (fail closed).

Cross-Language Conformance

Three verified implementations ensure interoperability:

TypeScript

MCP Gateway (Cloudflare Workers)

94 tests

Python

SDK (PyNaCl)

97 tests

Go

Verifier CLI

cross-verify all bundles

30 shared test vectors across 9 categories ensure byte-for-byte canonical output, identical signatures, and matching Merkle roots.

Mappings v1.0Last updated: March 2026
Request Full Mappings

NIST AI RMF 1.0

AI Risk Management Framework (NIST AI 100-1)

ControlRequirementMechanismEvidence Field(s)Verification Step
GOVERN 1.1Policies establishedPolicy reference hash in governance receiptsreceipt.policy_referenceVerify policy_reference matches expected configuration hash
GOVERN 1.3Oversight mechanismsSigned governance receipt chainreceipt.decision, receipt.previous_receipt_hashVerify receipt signatures, validate chain continuity
MAP 1.5Risk documentedEvidence bundle with Merkle root commitmentbundle.merkle_root, bundle.policy_referenceVerify Merkle proofs, confirm bundle consistency
MAP 3.1Benefits/costs assessedReceipt chain analysis (PERMITTED vs DENIED ratios)receipt.decision, receipt.reasonCount decisions by type, analyze denial reasons
MEASURE 2.3Effectiveness trackedTimestamped receipt chain with tool-level decisionsreceipt.tool_name, receipt.decision, receipt.timestampVerify receipt signatures, analyze decision patterns over time
MEASURE 2.6Feedback incorporatedPolicy reference versioning across bundlesbundle.policy_reference (changes across bundle versions)Compare policy_reference across sequential bundles
MANAGE 2.4Incidents documentedDENIED receipts with reason codesreceipt.decision: DENIED, receipt.reasonFilter denied receipts, verify signatures, analyze reasons
MANAGE 4.1Risk response deployedEvidence of denied tool callsreceipt.decision: DENIED, receipt.tool_nameVerify denial receipts exist for high-risk tools

NIST SSDF

Secure Software Development Framework (SP 800-218)

ControlRequirementMechanismEvidence Field(s)Verification Step
PO.1.1Security requirements definedPolicy reference hash embedded in every receiptreceipt.policy_referenceVerify policy_reference is consistent across receipt chain
PO.3.2Roles and responsibilitiesEd25519 public key binding per gatewayreceipt.public_key, bundle.public_keyVerify public_key matches authorized gateway
PS.1.1Software protectedSigned receipt chain with tamper detectionreceipt.signature, receipt.previous_receipt_hashVerify chain integrity, detect any modification
PS.2.1Software integrity verifiedBundle verification (5-step process)verification_result.overall_validRun offline verifier, confirm all 5 steps pass
PW.4.4Cryptographic practicesEd25519 signatures, SHA-256 hashing, RFC 8785 JCSreceipt.algorithm: Ed25519-SHA256-JCSVerify all signatures using declared algorithm
PW.8.1Testing and verificationCross-language test vectors (30 vectors, 3 implementations)Test vector conformance across Python, TypeScript, GoRun cross-language test suite, confirm all vectors pass
RV.1.1Vulnerabilities identifiedReceipt chain analysis for anomalous patternsreceipt.decision: DENIED, receipt.reasonAnalyze denied receipts for security-relevant patterns
RV.3.3Root cause analyzedReceipt chain forensics with timestampsFull receipt chain with timestamps and reasonsReconstruct event timeline from chain

NIST SP 800-53 Rev. 5

Security and Privacy Controls (Selected)

ControlRequirementMechanismEvidence Field(s)Verification Step
AU-2Event LoggingGovernance receipt per tool call decisionreceipt.tool_name, receipt.decision, receipt.timestampVerify all tool calls have corresponding receipts
AU-9Audit Information ProtectionEd25519 signed, hash-chained receiptsreceipt.previous_receipt_hash, receipt.signatureVerify chain integrity, detect tampering
AU-10Non-repudiationEd25519 signatures on all receiptsreceipt.signature, receipt.public_keyVerify signatures against published gateway key
CM-2Baseline ConfigurationPolicy reference hash in receipt chainreceipt.policy_reference, bundle.policy_referenceVerify policy_reference is consistent and expected
CM-3Configuration Change ControlPolicy reference tracking across bundle versionsbundle.policy_reference (compare across versions)Detect policy_reference changes between bundles
SI-4System MonitoringContinuous receipt generation for all tool callsreceipt.timestamp, receipt.tool_nameVerify receipt timestamps show continuous monitoring
SI-7Software IntegrityBundle Merkle root and receipt chain integritybundle.merkle_root, merkle_proofsVerify Merkle proofs, confirm bundle consistency
SA-10Developer Configuration ManagementCross-language test vector conformance30 test vectors, 3 verified implementationsRun cross-language test suite, confirm all pass

CoSAI MCP Security Threat Coverage

12/12

Coalition for Secure AI (CoSAI), OASIS Open Project, January 2026

The CoSAI MCP Security whitepaper identifies 12 core threat categories and nearly 40 distinct threats specific to Model Context Protocol deployments. AGA maps to mechanisms in all 12 categories through its governance architecture.

IDThreat CategoryDomainAGA Governance Mechanism
T1Improper AuthenticationIdentity & AccessEd25519 receipt signatures, gateway public key binding, algorithm fail-closed verification
T2Missing Access ControlIdentity & AccessGateway-level tool allowlist/denylist, PERMITTED/DENIED receipts with policy reference
T3Input Validation FailuresInput HandlingArguments hash in receipts (SHA-256 of canonical tool arguments), tamper-evident chain
T4Data/Control Boundary FailuresInput HandlingPolicy-driven tool governance (permitted tools, denied tools), signed decision records
T5Inadequate Data ProtectionData & CodeArguments stored as SHA-256 hash only (not plaintext), Merkle proof for selective disclosure
T6Missing Integrity ControlsData & CodeSHA-256 hash chaining, Ed25519 signatures, Merkle tree binding, offline verification
T7Session/Transport SecurityNetwork & TransportEd25519 signed receipts with timestamps, receipt chain continuity, bundle-level Merkle root
T8Network Isolation FailuresNetwork & TransportOffline-capable evidence bundles, no external service dependencies for verification
T9Trust Boundary FailuresTrust & DesignPolicy reference committed in receipts, gateway as trust boundary, decisions recorded not delegated
T10Resource ManagementTrust & DesignPer-tool decision tracking, receipt chain provides complete audit trail of tool call volume
T11Supply Chain FailuresOperationalCross-language test vectors (30 vectors), three verified implementations, deterministic signatures
T12Insufficient ObservabilityOperationalSigned receipts, tamper-evident continuity chain, Merkle anchoring, offline evidence bundles

NSA AI/ML Supply Chain Risks and Mitigations

Joint Cybersecurity Information Sheet (March 2026)

NSA RecommendationAGA MechanismClaim/Embodiment
Verify data integrity with checksums, hashes, digital signaturesSubject Identifier (bytes commitment + metadata commitment)Claim 1(b)
Maintain verified model registry with integrity checksSealed Policy Artifact with immutable reference hashClaim 1(d)
Use lineage tracking for data provenanceContinuity Chain with structural metadata linkingClaim 3
Perform initial and periodic performance testingContinuous measurement at policy-defined cadenceClaim 1(f), Embodiment 1-10
Maintain SBOM documentationSBOM digest measurement and sealed verificationClaim 7, Embodiment 5
Cryptographic signing across model lifecycleEd25519 signatures on artifacts, receipts, and chain eventsClaim 1(d), Claim 3(b)
Use trusted computing environment with Zero TrustPortal runtime boundary, agent holds no signing keysClaim 1(e), Section F
Quarantine and test externally sourced componentsLaunch Gate validation, blocks execution if initial hash failsClaim 1(e)(ii)

The NSA guidance recommends these measures as best practices. AGA provides the cryptographic enforcement mechanism that makes them operationally verifiable.

EU AI Act

High-risk AI system requirements (enforcement: August 2, 2026)

EU AI Act ArticleRequirementAGA MechanismEvidence
Article 9Risk management systemPolicy Artifact encodes risk parameters and enforcement thresholdspolicy_reference, enforcement_parameters
Article 12RecordkeepingContinuity Chain with signed receipts for every enforcement eventFull receipt chain with timestamps
Article 13TransparencyEvidence Bundles exportable for third-party auditbundle_manifest, Merkle proofs
Article 14Human oversightEnforcement actions (TERMINATE, QUARANTINE, SAFE_STATE) with signed receiptsreceipt.decision.action
Article 15Accuracy, robustness, cybersecurityContinuous drift detection against sealed integrity baselinesMEASUREMENT_OK / DRIFT_DETECTED receipts

These mappings describe architectural alignment, not legal compliance advice. Actual compliance depends on implementation context and assessment by qualified legal counsel.

Evidence Artifact Summary

Policy Artifact provides:

  • Governance policy establishment (GOVERN)
  • Baseline configuration (CM-2)
  • Security requirements (PO.1.1)

Enforcement Receipt provides:

  • Event logging (AU-2)
  • Non-repudiation (AU-10)
  • Incident documentation (MANAGE)

Continuity Chain provides:

  • Audit protection (AU-9)
  • Change control (CM-3)
  • Effectiveness tracking (MEASURE)

Evidence Bundle provides:

  • Offline verification capability
  • Third-party audit support
  • Portable evidence packaging