Instrument
Technical Enforcement Appendix
This appendix describes implementation considerations relevant to non-creation and non-retention claims in modern cloud infrastructure. It identifies common persistence surfaces, outlines enforcement requirements at the operator layer, and explains the relationship between implementation controls and verification procedures.
This appendix supplements ARCS v1.0. It describes implementation requirements and considerations. It does not itself constitute a separate specification.
1. Default retention surfaces
A typical web application deployed on modern cloud infrastructure may create multiple independent persistence surfaces. These may include application frameworks, managed databases, CDN and edge layers, error-monitoring services, observability platforms, centralized logging systems, backup and snapshot systems, analytics pipelines, and vendor-side safety or moderation systems.
Depending on configuration, AI interaction content may pass through and be retained by multiple layers in this stack. Request payloads may be logged by application frameworks or middleware. Error handlers may serialize request context into exception reports. Observability platforms may ingest payload fragments as traces or events. Backups may replicate any content that has entered persistent application storage.
The relevant implementation question is whether operator controls prevent in-scope interaction content classified as ephemeral from entering these persistent surfaces.
2. Enforcement scope
Enforcement should address each operator-controlled persistence surface within the defined system boundary. Preventing writes to one surface while allowing the same content to persist in another does not support a non-creation or non-retention claim for the overall deployment.
Accordingly, where a deployment classifies interaction content as ephemeral, the operator should ensure that such content does not persist in any operator-controlled layer beyond the active session unless retention is expressly required by the applicable retention posture.
3. Content-telemetry separation
Implementation should maintain a strict separation between instruction content and operational telemetry.
Instruction content may include prompts, responses, and intermediate reasoning or planning traces where present. Operational telemetry may include timestamps, session identifiers, model versions, latency measurements, success or failure status, and token counts.
Telemetry may be logged and retained in accordance with the operator's retention policy. Instruction content classified as ephemeral should not enter the telemetry pipeline.
Implementation typically requires request interception or equivalent middleware that extracts metadata before forwarding content to the AI processing layer. Verification should confirm that telemetry records do not contain prompt, response, or intermediate-content fragments.
4. Memory-only execution
For sessions classified as ephemeral, interaction payloads should be handled in volatile memory for the duration of processing and should not be written to persistent storage.
This generally requires disabling request-body logging in the application framework, applying redaction or exclusion rules in request interceptors, confirming that error handlers do not serialize request payloads into persistent exception systems, and confirming that middleware components do not cache request or response bodies to disk or other persistent media.
5. Logging and monitoring configuration
Centralized logging and monitoring systems should be configured to reject, exclude, or redact AI interaction content where such content is classified as ephemeral.
This may include dropping request bodies from designated AI routes, omitting or hashing identifiers where necessary to reduce recoverability, filtering entries that match configured payload signatures, and confirming that secondary log sources do not reintroduce content through container output, syslog forwarding, or cloud-provider pathways.
The specific technical method may vary by deployment, but the control objective remains the same: ephemeral interaction content should not persist in operator-controlled logging or monitoring systems.
6. Backup exclusion
Ephemeral content should not enter backup or snapshot systems. As a practical matter, this follows from controlling upstream persistence surfaces. Where content is not written to persistent application storage, it should not appear in derivative backup systems that replicate that storage.
Operators should nevertheless verify that backup samples, analytics exports, and downstream data pipelines do not contain in-scope interaction content through indirect or secondary persistence pathways.
7. Session-bounded destruction
For sessions classified as session-bounded, destruction should be automatic, documented, and verifiable.
Implementation may include TTL enforcement for eligible records, expiry-based purge policies, destruction-job logging that records completion events without recording substantive content, and memory-handling procedures appropriate to system design.
Where destruction claims are made, operators should maintain sufficient evidence to support later verification.
8. Sovereignty receipts
Where used, sovereignty receipts document the retention class applied to a session, the relevant policy version or policy hash, the session timestamp, the applicable destruction schedule where relevant, and an attestation concerning the governance action performed.
A sovereignty receipt should contain no AI interaction content. It is a metadata-only record intended to document governance posture and execution state for the session.
Operators may retain sovereignty receipts as compliance documentation and may use them in audit, regulatory, insurance, or dispute-response contexts, subject to the scope and limitations of the underlying implementation and verification procedures.
9. Residual surfaces
Even where operator-side enforcement is implemented correctly, residual retention surfaces may remain outside the operator's control.
These may include model-provider retention, third-party API gateways, proxy services, load balancers, and other external intermediaries. Vendor disclosure, contractual controls, and zero-data-retention arrangements may reduce these surfaces, but may not eliminate them entirely.
Preservation obligations may also require future sessions or classes of sessions to shift from ephemeral treatment to a retained posture. Implementations should therefore support retention-class switching where required by preservation or legal-hold procedures.
10. Verification
Verification procedures relevant to these implementation requirements are defined in the ARCS Verification and Attestation Protocol. This appendix addresses implementation guidance; it does not define audit procedure.
Where non-creation or non-retention claims are made, operators should be able to support those claims through documented controls, configuration review, system testing, and other verification methods appropriate to the deployment.