Skip to main content

Governance Controls Checklist

Use this as a pragmatic implementation checklist.

This checklist is not a standard; it is an operational companion to /docs/standards/.

Identity & attribution

  • Agents have unique identities (agent_id)
  • Actions are traceable to a responsible party (human owner or team)
  • Correlation IDs exist for multi-step workflows

Logging & audit trail

  • Action ledger captures required fields (timestamp, inputs, outputs, resources, rationale)
  • Logs are searchable and retained per policy
  • Log integrity is protected (access controls; higher assurance may require tamper-evidence)

Oversight

  • High-risk checkpoints are defined
  • Approvals are recorded with approver identity + timestamp + scope
  • Overrides are possible and logged
  • Emergency stop procedure exists and is accessible

Boundaries & invariants

  • Environment boundaries are enforced and tested
  • Tenancy boundaries are enforced and tested (RLS or equivalent)
  • AuthZ is consistent (no unguarded routes)
  • Secrets and credentials are least-privilege and rotated

Change safety

  • CI blocks merges that violate invariants
  • Schema migration verification exists
  • Rollback plans exist for high-risk changes

Drift control

  • Docs synchronization checks exist
  • Schema drift checks exist
  • Monitoring detects anomaly patterns (error spikes, unusual deploy patterns)

Reporting

  • Governance metrics exist (policy violations, approval latency, incident rate)
  • Evidence packages can be produced for audits