Skip to content
§ VII · Domain OUT
Controls
14
Edition
v.1.2

OUT · Domain 7 of 9

Output Integrity & Supply Chain

Groundedness, safety, fairness, and provenance of outputs — and trust in upstream providers.

OUT addresses what comes out of the agent and what was used to build it. Groundedness checks, safety filters, fairness testing, and provenance tracking for outputs. On the supply side: model provenance, training-data provenance, and the chain of trust to upstream providers.

Table OUT.1 · Controls in OUT · v.1.214 controls · 5-level maturity
OUT-01

Groundedness and hallucination checks

Groundedness or hallucination checks are applied to outputs that make factual claims. Ungrounded or unverifiable claims are flagged, filtered, or annotated per policy.

Outputs claiming to cite source material are checked for groundedness in the cited source. Ungrounded or unverifiable claims are flagged, filtered, or annotated per the organization's policy. Hallucination detection techniques are documented, and detection rates are measured. This is the first line of defense against the most visible failure mode of deployed AI agents.

L3 · Operated

Groundedness checks are applied to all outputs that make factual claims; detection techniques and rates are documented; ungrounded outputs are handled per policy; hallucination rates are tracked over time.

OUT-02

Content safety filters

Content safety filters are applied to outputs, covering harmful content, harassment, illegal content, and other categories defined in the Behavior Charter.

Outputs are passed through safety filters appropriate to the deployment context. Filters cover harmful content, harassment, illegal content, and any additional categories defined in the agent's Behavior Charter. Filter configuration is documented, and filter effectiveness is measured. False negatives are treated as findings; false positives are tracked and tuned.

L3 · Operated

Safety filters are active on all output paths; filter categories match the Behavior Charter; filter effectiveness is measured; false-negative incidents are tracked through remediation.

OUT-03

PII and secrets leakage prevention

PII and secrets leakage detection is applied to outputs. The agent does not disclose credentials, internal system information, other users' data, or other sensitive information.

Outputs are scanned for PII, credentials, internal system information, and other sensitive data that should not be disclosed. The agent does not leak secrets, other users' data, or internal implementation details in its outputs. This control is the output-side complement to DAT-03's input-side PII handling and is critical for preventing data breaches through agent outputs.

L3 · Operated

Leakage detection is active on all output paths; detection covers PII, credentials, and internal system information; no leakage incident has occurred in the review period or all incidents have been remediated.

OUT-04

Citation and provenance

Citation and provenance are provided where outputs are sourced from retrieval. Any factual claim drawn from retrieved content is traceable to its source.

Outputs that reference external information carry citations to their source. Any factual claim drawn from retrieved content is traceable to the specific source document, enabling the recipient to verify the claim independently. Citation quality is measured as part of groundedness checks under OUT-01.

L3 · Operated

Citations are provided for retrieval-sourced outputs; citation accuracy is measured; source traceability has been verified through sampling; citation quality trends are tracked.

OUT-05

Model provider inventory

A model provider inventory is maintained, identifying which foundation models are in use for which agents, under which contractual terms, and with what data-use commitments.

The organization maintains a current inventory of all model providers used across its agent estate. For each provider-agent relationship, the inventory records the model version, contractual terms, data-use commitments, and any restrictions on use. This inventory is the foundation for supply-chain risk management and is referenced by OUT-09 and OUT-12.

L3 · Operated

Inventory exists and covers all provider-agent relationships; entries are current within the documented cadence; contractual terms and data-use commitments are documented; inventory is referenced in vendor management reviews.

OUT-06

Third-party integration inventory

A third-party integration inventory is maintained (MCP servers, plugins, tool providers, vector databases, embedding providers, external agents). Each integration carries a documented risk assessment.

Beyond model providers, the organization maintains an inventory of all third-party integrations — MCP servers, plugins, tool providers, vector databases, embedding providers, external agents. Each integration carries a documented risk assessment. This inventory is the supply-chain complement to the model provider inventory in OUT-05.

L3 · Operated

Inventory exists and covers all third-party integrations; risk assessments are documented per integration; the inventory is reviewed at a documented cadence; new integrations go through the risk-assessment process before activation.

OUT-07

Third-party integration review

Third-party integrations are reviewed periodically for continued necessity, security posture, and contractual terms.

Third-party integrations identified in OUT-06 are reviewed at a documented cadence for continued necessity, security posture, and contractual terms. Integrations that are no longer needed are decommissioned. Integrations with degraded security posture trigger remediation or replacement. This ongoing review prevents integration sprawl and stale supply-chain risk.

L3 · Operated

Reviews are conducted at the documented cadence; review records are retained; at least one integration has been decommissioned or remediated as a result of review; no integration is past its review date.

OUT-08

Open-source dependency scanning

Open-source dependencies are scanned for vulnerabilities and pinned to reviewed versions.

Open-source dependencies in the agent's codebase and infrastructure are scanned for known vulnerabilities and pinned to reviewed versions. Vulnerability findings are triaged and remediated within documented SLAs. Unpinned or unscanned dependencies are not permitted in production. This control applies standard software supply-chain hygiene to the agent context.

L3 · Operated

Dependency scanning is automated and runs on every build or at a documented cadence; all dependencies are pinned; vulnerability findings are triaged within SLA; no critical vulnerabilities are unresolved past the remediation window.

OUT-09

Vendor contractual requirements

Vendor agreements with model providers and tool providers explicitly address training-data use, data residency, breach notification, model-update notification, and right to audit or attestation evidence.

Vendor agreements with model and tool providers explicitly address training-data use, data residency, breach notification, model-update notification, and right to audit or attestation evidence. These contractual requirements ensure that the organization's data protection, provenance, and change-management obligations can be met even when the underlying capability is provided by a third party.

L3 · Operated

Vendor agreements covering the required terms exist for all material providers; agreements are reviewed at contract renewal; compliance with key terms is verified at a documented cadence.

OUT-10

Fairness monitoring in production

Fairness metrics defined under SPC-09 are monitored in production. Material drift in disparity metrics triggers re-assessment under Domain 2 and the change-management process.

Fairness metrics established during pre-deployment evaluation under SPC-09 are monitored continuously in production. Material drift in disparity metrics — measured against documented thresholds — triggers re-assessment under Domain 2 and the change-management process under GOV-05. This control ensures that fairness is not a one-time gate but a continuous obligation.

L3 · Operated

Fairness metrics are monitored in production; drift thresholds are documented; at least one monitoring cycle has been completed; no material drift has occurred or drift has been addressed through re-assessment.

OUT-11

AI-generated content disclosure

Where regulation or contract requires disclosure of AI-generated or AI-modified content, watermarking, or provenance signaling (e.g., C2PA), the requirements are honored. Disclosure is auditable.

Where regulation or contract requires disclosure of AI-generated or AI-modified content, the organization honors those requirements through watermarking, provenance signaling (e.g., C2PA), or explicit disclosure. The disclosure mechanism is auditable — an assessor can verify that required disclosures are being made and that the mechanism has not been circumvented.

L3 · Operated

Disclosure requirements are documented per agent and jurisdiction; disclosure mechanisms are operational; compliance is verified by audit or automated monitoring; disclosure records are retained.

OUT-12

Model version pinning

Foundation models in use are pinned to specific versions where the provider supports pinning. Provider-pushed model updates are tested before release to production traffic.

The agent operates against pinned model versions; upstream model changes go through change management. Provider-pushed model updates are tested against the standing evaluation set (SPC-07) and the behavior baseline (SPC-06) before release to production traffic. Material deltas are treated as material change under GOV-05. This control prevents silent model updates from changing agent behavior without oversight.

L3 · Operated

Model versions are pinned for all production agents where the provider supports pinning; the most recent provider-pushed update was tested before production release; material deltas triggered change management.

OUT-13

Explainability for consequential decisions

Where the agent makes or materially influences a consequential decision affecting an individual, an explanation of the basis for that decision is producible on request, in a form intelligible to the affected person.

Where the agent makes or materially influences a consequential decision affecting an individual, an explanation of the basis for that decision is producible on request, in a form intelligible to the affected person. Explanations are supported by logging under MON-01 and DAT-13. This control operationalizes the right to explanation present in multiple regulatory frameworks.

L3 · Operated

Explanation capability exists for all consequential-decision agents; at least one explanation has been produced and verified for intelligibility; explanation production is supported by the logging infrastructure.

OUT-14

Contestability and appeal process

A documented process allows affected individuals to contest or appeal a consequential agent decision and to obtain human review. The process is published in user-facing terms.

A documented process allows affected individuals to contest or appeal a consequential agent decision and to obtain human review. The process is published in user-facing terms and tracked through the human review queue (MON-05). This control ensures that agent decisions are not final — that a human path exists for individuals who believe they have been treated unfairly or incorrectly.

L3 · Operated

Contestability process is documented and published in user-facing terms; the process is tracked through the human review queue; at least one contest or appeal has been processed or the process has been tested end-to-end.

Cross-references