Section navigation

Annex AO: Enterprise Governance Interceptor Workflow

This annex is informative. It provides a worked example of lifecycle governance surfaces created when enterprise governance interceptors operate at trust boundaries in agent workflows.

AO.1 Deployment Pattern

An enterprise deploys a governance interceptor framework within its agent infrastructure. The framework inserts three types of controls at defined trust boundaries between agents and the tools, data sources, and services they access. Each agent interaction passes through the interceptor chain before reaching its destination. The interceptors enforce compliance policies, validate content safety, transform payloads, and log operations. The framework operates on both sides of the trust boundary between the agent client and the tool server, meaning each party in the exchange independently generates governance records.

AO.2 Interceptor Types and Record Surfaces

AO.2.1 Validators

Validators evaluate messages at trust boundaries and return a decision: accept or block. Validation checks may include detecting sensitive content, checking for prompt injection, verifying schema conformance, and assessing citation quality.

Each validation event produces a decision record containing the severity assessment, the evaluated path, the decision rationale, and optionally a cryptographic signature attesting that the validation occurred. Validators execute in parallel, meaning a single message crossing a trust boundary may generate multiple independent validation decision records.

ARCS-TAX applies to classifying validator decision records as a distinct record type. ARCS-LIF applies to lifecycle boundary identification: validator decisions may persist independently of the interaction they evaluated. ARCS-VER applies where cryptographic signatures provide attestation of governance events.

AO.2.2 Mutators

Mutators transform message content before or after it crosses a trust boundary. Transformation functions may include redacting sensitive content, enriching payloads with contextual data, filtering prohibited material, and normalizing formats. Mutations are atomic and execute sequentially.

Each mutation event produces a transformation record containing the pre-mutation payload, the post-mutation payload, modification flags, and the transformation rationale. Mutators necessarily encounter pre-transformation content during execution, including content before redaction was applied.

ARCS-TAX applies to classifying transformation records, with particular attention to pre-transformation content as a distinct and potentially high-sensitivity record class. ARCS-LIF applies to lifecycle boundary identification: pre-transformation content that persists in mutation logs may constitute the most sensitive artifact in the system, because it contains the original data before protective controls were applied. ARCS-NCR applies where the operator determines that pre-transformation content should not persist beyond the mutation event.

AO.2.3 Observability Interceptors

Observability interceptors operate in fire-and-forget mode, logging events without blocking execution. An observability interceptor subscribed to all events captures the full payload of every operation: message content, execution duration, principal identity, trace identifiers, session identifiers, timestamps, and alert records.

Observability interceptors that subscribe to all events may capture content before mutation occurs, because they record the payload at the point of interception rather than after transformation. This creates a condition where the observability layer retains pre-transformation content that the mutation layer was designed to remove from the transmitted message.

ARCS-LIF applies to lifecycle boundary identification for observability records. ARCS-TAX applies to distinguishing observability telemetry from governed audit records. The governance question is whether observability data is treated as ephemeral operational telemetry or as retained business records with independent lifecycle requirements.

AO.3 Trust Boundary Architecture

The interceptor framework operates independently on both sides of the trust boundary between the agent client and the tool server. Outbound data passes through mutation, then validation, then transmission on the client side. Inbound data passes through validation, then mutation, then processing on the server side. Both sides independently generate validator decisions, mutation records, and observability logs.

This architecture creates a cross-boundary record duplication condition: a single message exchange generates governance records on both sides of the trust boundary, under different parties' infrastructure, potentially under different retention policies. Neither party's deletion of its own interceptor records affects the other party's copies.

ARCS-CUS applies to custody mapping across the trust boundary. ARCS-DEL applies to delegation and custody-chain extension when governance records are held independently by multiple parties in a single exchange.

AO.4 Prompt and Response Interception

Where the interceptor framework includes a hook into the full prompt-response cycle (for example, intercepting chat completions at the model API layer), the interceptor sees the complete prompt, the complete response, and the full context of the exchange. Mutation interceptors at this layer can transform prompts before they reach the model and responses before they reach the user. Observability interceptors at this layer can capture the full conversation.

This creates a record surface that contains the most complete representation of the agent interaction in the system. The prompt-response record may include content that does not appear in any other log, because it captures the interaction at the model boundary rather than at the tool boundary.

ARCS-AGT applies to identifying prompt-response interception records as a distinct agentic record class. ARCS-PV applies where prompt-response records are subject to preservation obligations, particularly where they contain content relevant to regulatory, legal, or compliance review.

AO.5 Pre-Transformation Content

Pre-transformation content is the record class with the highest sensitivity and the least clear retention governance in interceptor architectures. When a mutation interceptor redacts sensitive content from a message before transmission, the mutation event necessarily involves access to the original, unredacted content. If the mutation log, the observability layer, or any downstream system retains that original content, the infrastructure designed to protect sensitive data has simultaneously created the record class most likely to be sought in discovery or regulatory examination.

The governance question is not whether redaction was applied to the transmitted message. The question is whether the original content persists anywhere in the interceptor chain after redaction occurred.

ARCS-LIF applies to lifecycle boundary identification for pre-transformation content. ARCS-NCR applies where the operator implements a non-creation posture for pre-transformation persistence. ARCS-PV applies where pre-transformation content may be subject to preservation demands precisely because it contains material that was deliberately removed from the transmitted version.

AO.6 Cryptographic Attestation

Where the interceptor framework includes a cryptographic signature field on validation results (whether implemented or reserved for future use), the signature provides tamper-proof evidence that a validation event occurred at a trust boundary. The signature attests that the check happened. It does not govern the lifecycle of the record the check produced.

ARCS-VER applies to verification and audit of governance event attestation. The distinction between attestation that governance occurred and governance of the records governance produced is a recurring boundary in interceptor architectures.

AO.7 Payment Event Within Interceptor Workflow

Where an agent workflow includes an autonomous payment step, the interceptor chain and the payment protocol create records simultaneously. An agent that pays for access to a data source, compute resource, or third-party service via an HTTP-native payment protocol generates payment records alongside the interceptor records documented in Sections AO.2 through AO.6.

A single paid data access event within a governed agent workflow may produce: interceptor records (validator decisions on the payment request, mutator transformations of the request payload, observability logs of the full payment flow including any pre-transformation content), payment records (settlement confirmation, payment authorization trace, facilitator verification record, agent spending decision record), and received-data records (the content or service delivered in exchange for payment).

Payment records and interceptor records are generated by different infrastructure layers, held by different parties, and subject to different regulatory frameworks. Payment records may fall under financial transaction retention obligations (PCI DSS, SEC/FINRA recordkeeping, BSA/AML) that do not apply to the interceptor records generated in the same workflow. Interceptor records may contain pre-transformation content that includes payment details before redaction was applied.

Where settlement occurs on a public blockchain, the settlement record is a permanent, publicly visible artifact outside any party's retention governance. The off-chain records that explain the settlement, including what was purchased, why the agent authorized the payment, how the purchased data was used, and what interceptor decisions were made about the payment request, are mutable, fragmented across the agent operator, service provider, facilitator, and payment processor, and subject to operator retention posture. This creates a paired record environment where the payment anchor is infrastructure-guaranteed and the explanatory layer is operator-governed.

ARCS-LIF applies to lifecycle boundary identification for payment-associated records within interceptor workflows. ARCS-CUS applies to custody mapping across the agent operator, service provider, facilitator, and payment processor. ARCS-DEL applies to delegation of spending authority to the agent. ARCS-TAX applies to distinguishing payment records from interceptor records from received-data records as separate record classes with independent lifecycle requirements.

AO.8 Summary of ARCS Control Family Applicability

Record Surface Primary ARCS Families
Validator decision records TAX, LIF, VER
Mutator transformation records TAX, LIF, NCR
Observability audit logs LIF, TAX
Pre-transformation content LIF, NCR, PV
Prompt-response interception records AGT, PV
Cross-boundary record copies CUS, DEL
Cryptographic attestation artifacts VER
Payment authorization and settlement records LIF, CUS, DEL, TAX
Facilitator and processor records CUS, DEL
Received-data / purchased-service records LIF, TAX
Payment-interceptor compound records LIF, CUS, TAX, PV

AO.9 Retention Acknowledgment Without Lifecycle Governance

Enterprise interceptor frameworks may include compliance sections that reference regulatory requirements (such as data protection regulations, healthcare privacy rules, security certification standards, or payment card standards) and state that data retention policies apply to interceptor logs. This acknowledgment recognizes that retention is a compliance concern. It does not by itself constitute lifecycle governance.

Lifecycle governance requires defined retention periods per record class, custody assignment per record surface, deletion verification mechanisms, preservation capability for records subject to legal hold, and producibility assessment for records reachable under legal process. Where an interceptor framework acknowledges retention as a concern without specifying these mechanisms, the acknowledgment and the governance gap coexist.

ARCS-LIF, ARCS-CUS, ARCS-PV, and ARCS-VER collectively address the lifecycle governance layer that sits between retention acknowledgment and operational governance.

AO.10 Classification Framework

The central classification problem across enterprise governance interceptor architectures is distinguishing five categories of artifact:

Governance decision records. Validator decisions, policy-match results, block and escalation events. These document what the governance layer decided and may carry audit or compliance retention obligations.

Transformation records. Pre-mutation and post-mutation payloads, modification flags, transformation rationale. These document what the governance layer changed and may contain the most sensitive content in the system.

Operational telemetry. Observability logs, execution metrics, trace identifiers, session identifiers. These may persist beyond their operational purpose if the platform defaults to retention.

Attestation artifacts. Cryptographic signatures, validation receipts, governance event proofs. These document that governance occurred. Their own lifecycle, independent of the records they attest to, is a separate governance question.

Payment-layer records. Settlement records, authorization traces, facilitator records, spending decision records, and received-data records generated when the workflow includes an autonomous payment step. These are subject to financial transaction retention obligations independent of the interceptor records generated in the same workflow, and they may include a permanently public settlement component alongside mutable off-chain explanatory records.

An operator that has not classified its interceptor and payment artifacts across these five categories may discover that its governance controls and commerce capabilities, both operating correctly, have simultaneously created the largest, most sensitive, and most jurisdictionally complex retention surface in the system.