Skip to content
§ I · Domain GOV
Controls
11
Edition
v.1.2

GOV · Domain 1 of 9

Governance & Accountability

Ownership, policy, and risk-management discipline for every agent in production.

GOV defines the human chain of accountability for every AI agent deployed in production. It covers risk-owner designation, policy ratification, incident response governance, change-control approval, and the documented authority to suspend or revoke an agent. Without GOV, no other domain is auditable.

Table GOV.1 · Controls in GOV · v.1.211 controls · 5-level maturity
GOV-01

Risk owner designation

Every production agent has a designated technical owner and a business owner, documented in an agent registry.

A named individual — not a team or a role queue — is the accountable risk owner for each agent. The risk owner has the documented authority to suspend the agent at any time without further approval, and is the point of contact for HI-AAF assessors during a Letter of Assessment.

L3 · Operated

Risk owner is recorded in the agent registry with current contact information; the suspend authority has been exercised in at least one drill or live incident; succession is documented.

GOV-02

Agent Behavior Charter

Each agent has a published Agent Behavior Charter documenting intended purpose, authorized scope, permitted tools and data, prohibited actions, escalation paths, and review cadence.

The Behavior Charter is the controlling document for an agent in production. It captures the agent's intended purpose, authorized scope, permitted tools and data sources, prohibited actions, escalation paths, and review cadence. It is the single artifact an assessor reviews first and the document against which all other controls are measured.

L3 · Operated

Charter exists for every production agent, is version-controlled, has been reviewed within the documented cadence, and is referenced by the operating runbook and the pre-deployment test plan.

GOV-03

Agent Risk Register

An Agent Risk Register is maintained, scoring each agent on impact and likelihood, reviewed at least quarterly by accountable leadership.

The risk register captures, for each agent, the categories of harm the agent could cause, the likelihood and severity of those harms, the controls applied to reduce them, and the residual risk accepted by the risk owner. It is reviewed at a documented cadence — at least quarterly — by leadership with authority to accept, escalate, or remediate risks.

L3 · Operated

Risk register is current within the documented cadence; entries include impact scores, likelihood ratings, and residual risk acceptance; review evidence is retained with sign-off records.

GOV-04

Acceptable Use Policy

An AI Acceptable Use Policy is approved at executive level and acknowledged by all personnel involved in agent development, deployment, or operation.

The organization has a written AI Acceptable Use Policy that has been formally ratified by executive leadership and acknowledged by every individual involved in the agent lifecycle — development, deployment, and operations. The policy sets boundaries on what agents may be used for, how they may interact with customers and systems, and the obligations of personnel working with them.

L3 · Operated

Policy is published and accessible; acknowledgment records exist for all relevant personnel; the policy has been reviewed and re-ratified within the prior twelve months.

GOV-05

Change management authority

A change management process governs material modifications to agent prompts, tools, model versions, or scope. Material changes require re-assessment under Domain 2.

Material changes to an agent — model swap, scope expansion, tool addition, prompt modification — require approval at a documented level before reaching production. The change management process defines what constitutes a material change, who approves it, and what re-assessment is triggered. Changes that bypass the process are treated as incidents.

L3 · Operated

Change management process is documented and followed; material changes are logged with approval records; at least one material change in the prior period went through the full process including re-assessment.

GOV-06

Lifecycle RACI

Roles and responsibilities for the agent lifecycle (design, build, deploy, monitor, retire) are documented in a RACI or equivalent.

A documented responsibility matrix — RACI or equivalent — assigns clear ownership for every phase of the agent lifecycle: design, build, deploy, monitor, and retire. The matrix is current and covers all agents in scope. Ambiguity in who is responsible for a lifecycle phase is one of the most common findings in HI-AAF assessments.

L3 · Operated

RACI matrix exists and covers all lifecycle phases for all production agents; personnel named in the matrix can describe their responsibilities; the matrix has been reviewed within the documented cadence.

GOV-07

Personnel training

Personnel involved in agent operations complete role-appropriate training on agent security and responsible AI at least annually.

Everyone involved in the agent lifecycle — developers, operators, reviewers, risk owners — receives training appropriate to their role on agent security, responsible AI practices, and the organization's AI policies. Training is refreshed at least annually and covers the specific risks and controls relevant to the agents those personnel work with.

L3 · Operated

Training records exist for all relevant personnel; training content is current and role-specific; completion rates are tracked and gaps are remediated within a documented SLA.

GOV-08

Board reporting cadence

Material AI agent risks are reported to executive leadership and, where appropriate, to the board on a defined cadence.

The board, or an equivalent designated governance committee, receives at a documented cadence (no less than annually for L3) a written report on the organization's AI agent estate: number of agents in scope, material incidents in the period, maturity trend, and any controls failing to operate.

L3 · Operated

At least one board-level or executive-level AI risk report has been delivered in the prior twelve months; the report covers agent inventory, incidents, and maturity posture; delivery evidence is retained.

GOV-09

Decommissioning procedure

Each agent has a documented decommissioning procedure covering data destruction, in-flight transaction handling, credential revocation, log retention, and removal from the agent registry.

Decommissioning an agent — including data disposal — follows a documented process and is logged. The procedure covers data destruction and retention per policy, in-flight transaction handling, affected-user notification, credential and authorization revocation, log retention post-retirement, and removal from the agent registry. Decommissioning evidence is retained for audit.

L3 · Operated

Decommissioning procedure is documented; at least one agent has been decommissioned following the procedure or the procedure has been tested in a drill; evidence of data disposal and credential revocation is retained.

GOV-10

Vulnerability disclosure

A coordinated vulnerability disclosure (CVD) process is published, including intake channel, acknowledgment SLA, triage and remediation timelines, and safe-harbor language.

The organization publishes a coordinated vulnerability disclosure process for its AI agents and supporting infrastructure. The process includes a public intake channel, an acknowledgment SLA, documented triage and remediation timelines, and safe-harbor language for good-faith researchers. CVD findings flow into the change management process under GOV-05.

L3 · Operated

CVD process is published and accessible; intake channel is monitored; at least one disclosure has been processed through the pipeline or the process has been tested end-to-end; findings are tracked through remediation.

GOV-11

Regulatory documentation pack

For agents classified as high-risk under applicable regulation, a technical documentation pack equivalent to EU AI Act Annex IV is maintained and updated on material change.

For each agent classified as high-risk under applicable regulation (e.g., EU AI Act Annex III), a technical documentation pack is maintained covering system description, design specifications, data governance, monitoring evidence, accuracy and robustness metrics, and risk-management process records. The pack is updated on every material change and is available for regulatory inspection.

L3 · Operated

Documentation packs exist for all high-risk agents; packs are current within the documented cadence; the most recent update aligns with the date of the last material change in the change-management record.

Cross-references