AG-160

Trusted Time, Event Ordering and Replay Protection Governance

Execution Integrity, Accountability & Approval Quality ~15 min read AGS v2.1 · April 2026
EU AI Act SOX FCA NIST eIDAS

2. Summary

Trusted Time, Event Ordering and Replay Protection Governance requires that every AI agent action is timestamped from a trusted, tamper-resistant time source, that events are ordered in a causally consistent and verifiable sequence, and that previously executed actions cannot be replayed to produce duplicate or unauthorised effects. Without trusted time, audit trails are unreliable. Without event ordering, causal reasoning about agent behaviour is impossible. Without replay protection, a single captured action request can be re-submitted indefinitely. This dimension ensures that the temporal foundation of agent governance is structurally sound — not dependent on the agent's own clock, not vulnerable to clock manipulation, and not susceptible to replay attacks.

3. Example

Scenario A — Clock Manipulation Enables Backdated Transactions: A cryptocurrency trading agent operates across three time zones, executing trades on exchanges in London, New York, and Singapore. The agent's timestamps are sourced from the local system clock of the server running the agent process. An attacker who gains access to the server sets the system clock back by 4 hours. The agent continues executing trades, but the audit log now records these trades as having occurred at 14:00 UTC when they actually occurred at 18:00 UTC. The backdated timestamps coincide with a market movement that makes the trades appear prescient. Regulators investigating potential market manipulation cannot rely on the audit trail because the timestamps are not independently verifiable.

What went wrong: The agent's timestamps depended on a mutable system clock within the same security domain as the agent. No independent, tamper-resistant time source was used. No cross-reference with external time witnesses existed. Consequence: Regulatory investigation for potential market manipulation. £4.7 million in trades under investigation. Audit trail ruled unreliable — the organisation cannot prove the trades occurred when the logs claim they did.

Scenario B — Replay Attack Duplicates Payment Authorisation: A procurement agent processes an invoice from a vendor for £125,000. The agent submits a payment authorisation request containing the invoice reference, amount, and an approval token. An insider captures the network request. Three weeks later, the insider replays the captured request. The payment system processes it as a new authorisation because the request contains a valid approval token and the system has no mechanism to detect that this exact request was previously processed. A second payment of £125,000 is issued against the same invoice.

What went wrong: The payment authorisation request contained no nonce, no timestamp-bound validity window, and no deduplication mechanism. The approval token was valid indefinitely. The system could not distinguish a new request from a replayed one. Consequence: £125,000 in duplicate payment. Vendor disputes return of funds. Internal investigation reveals 7 additional replayed payments totalling £890,000 over 6 months.

Scenario C — Event Ordering Ambiguity Breaks Causal Audit: A customer service agent and a fraud detection agent both operate on the same customer account. The customer service agent approves a refund of £3,200 at timestamp T1. The fraud detection agent flags the account as suspected fraud at timestamp T2. Both timestamps are recorded with one-second resolution. T1 and T2 are the same second. Post-incident review cannot determine whether the refund was approved before or after the fraud flag. If the refund was approved before the flag, the agent operated correctly with the information available. If the refund was approved after the flag, the agent should have escalated. The one-second resolution and lack of causal ordering makes the audit inconclusive.

What went wrong: Timestamps lacked sufficient resolution to order events occurring within the same second. No causal ordering mechanism (e.g., logical clocks, sequence counters) supplemented wall-clock timestamps. Consequence: Inconclusive internal investigation. Unable to determine whether governance controls functioned correctly. Regulatory report qualified with "unable to determine event sequence."

4. Requirement Statement

Scope: This dimension applies to every AI agent that produces audit-relevant events — actions, decisions, state changes, or communications. Any agent whose behaviour may need to be reconstructed after the fact for audit, investigation, dispute resolution, or regulatory inquiry is within scope. The scope extends to all components of the agent's execution environment that contribute timestamps to governance-relevant records: the agent runtime, the enforcement gateway, the action log, the audit system, and any external systems that the agent interacts with. Multi-agent pipelines are within scope both at the individual agent level (each agent's events must be properly timestamped and ordered) and at the pipeline level (cross-agent causal ordering must be maintained).

4.1. A conforming system MUST timestamp every agent action, decision, and governance event using a trusted time source that is independent of the agent's runtime environment and resistant to manipulation by any party with access to the agent process.

4.2. A conforming system MUST use timestamps with a minimum resolution of 1 millisecond and MUST include a timezone-unambiguous format (e.g., UTC with explicit offset, RFC 3339 format).

4.3. A conforming system MUST implement replay protection for all agent action requests, ensuring that a captured or recorded action request cannot be re-submitted to produce a duplicate effect.

4.4. A conforming system MUST assign a unique, non-reusable nonce or request identifier to every action request and MUST reject any request whose nonce has been previously processed.

4.5. A conforming system MUST implement a validity window for action requests, such that requests older than the window are rejected regardless of other validity checks.

4.6. A conforming system MUST maintain causal ordering of events within a single agent's execution context using monotonically increasing sequence counters or equivalent logical clocks.

4.7. A conforming system SHOULD synchronise time sources across all components of the agent governance infrastructure using NTP with authenticated time sources or equivalent protocols, maintaining clock skew below 100 milliseconds.

4.8. A conforming system SHOULD implement cross-agent causal ordering in multi-agent pipelines using vector clocks, Lamport timestamps, or equivalent distributed ordering mechanisms.

4.9. A conforming system MAY implement cryptographic timestamping using an external Time Stamping Authority (TSA) per RFC 3161 for high-value or legally sensitive actions.

5. Rationale

Time is the backbone of accountability. Every governance question — "What happened?", "In what order?", "Was this action authorised at the time it occurred?" — depends on accurate, trustworthy timestamps. When timestamps can be manipulated, backdated, or ambiguated, the entire audit trail becomes unreliable. An unreliable audit trail is worse than no audit trail, because it provides false assurance.

AI agents intensify the time integrity challenge in three ways. First, agents operate at machine speed — thousands of actions per second — making sub-second timestamp resolution essential for event ordering. A one-second resolution that suffices for human audit trails creates ordering ambiguity for agent audit trails. Second, agents operate in distributed environments where clock synchronisation cannot be assumed. An agent running in one cloud region, communicating with a gateway in another, and writing to a log in a third, may encounter clock skew measured in hundreds of milliseconds — enough to reverse the apparent order of causally dependent events. Third, agents generate structured, repeatable requests that are inherently susceptible to replay attacks. Unlike a human user whose requests vary with each interaction, an agent may produce identical requests for identical inputs. Without explicit replay protection, these requests are indistinguishable from replayed captured requests.

Replay protection is particularly critical because AI agent action requests are high-value targets. A single captured payment authorisation request, trade submission, or data access request can be replayed to duplicate the effect. Traditional session-based protections may not apply in agent-to-service communication patterns, where long-lived service credentials replace short-lived user sessions.

6. Implementation Guidance

The implementation requires three interlocking mechanisms: trusted timestamping, causal event ordering, and replay protection. These must be implemented at the infrastructure layer, not within the agent's own logic.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Financial Services. MiFID II requires clock synchronisation to UTC within specified tolerances: 1 millisecond for high-frequency trading, 1 second for other trading. RTS 25 specifies the synchronisation requirements. AG-160 timestamp resolution and synchronisation requirements should be configured to meet or exceed these tolerances. Transaction reporting under EMIR and MiFIR depends on accurate, verifiable timestamps.

Crypto/Web3. Blockchain-native timestamping provides partial coverage — on-chain events have block timestamps — but off-chain agent actions (API calls, database writes, inter-agent communications) still require AG-160 trusted time mechanisms. The gap between on-chain and off-chain temporal ordering is a common audit weakness.

Healthcare. Clinical event ordering can be patient-safety-critical. A medication agent that records a contraindication check after the prescription rather than before — due to clock skew — creates a misleading audit trail that could have malpractice implications. Healthcare deployments should target sub-millisecond clock synchronisation for clinical event chains.

Safety-Critical / CPS. Physical systems require time synchronisation that accounts for physical causality. An agent controlling an industrial process must timestamp control commands with sufficient accuracy to reconstruct the physical state sequence. IEC 61850 (power systems) and IEEE 1588 (precision time protocol) provide relevant standards.

Maturity Model

Basic Implementation — All agent actions are timestamped in UTC with millisecond resolution. Time sources are NTP-synchronised to public stratum-2 servers. Replay protection is implemented via request-level nonces with a 10-minute validity window. Nonce storage uses an in-memory set with periodic persistence. Event ordering within a single agent uses wall-clock timestamps only. Clock skew is not actively monitored.

Intermediate Implementation — Time sources use authenticated NTP (NTS) synchronised to stratum-1 sources. Clock skew is monitored continuously with alerting at 50ms threshold. Replay protection uses a distributed nonce store with guaranteed consistency. Each agent's events include both wall-clock timestamps and monotonic sequence counters. Multi-agent pipelines implement logical clocks for causal ordering. Validity windows are configured per action criticality (e.g., 2 minutes for financial actions, 10 minutes for low-value operations).

Advanced Implementation — All intermediate capabilities plus: high-value actions are anchored to an external TSA per RFC 3161. PTP (IEEE 1588) is deployed within the data centre for sub-microsecond synchronisation. Formal verification has confirmed that the causal ordering mechanism correctly handles all concurrency scenarios. Clock anomaly detection identifies and quarantines events with suspicious temporal characteristics (e.g., backward time jumps, impossible causal sequences). Independent audit has verified timestamp integrity across the full action history.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Testing AG-160 compliance requires verification of timestamp integrity, replay protection effectiveness, and causal ordering correctness.

Test 8.1: Trusted Time Source Independence

Test 8.2: Timestamp Resolution Verification

Test 8.3: Replay Attack Rejection

Test 8.4: Nonce Uniqueness Under Concurrency

Test 8.5: Validity Window Enforcement

Test 8.6: Causal Ordering Correctness

Test 8.7: Clock Anomaly Detection

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 12 (Record-Keeping)Direct requirement
MiFID IIRTS 25 (Clock Synchronisation)Direct requirement
EMIRArticle 9 (Reporting Obligation)Supports compliance
FCA SYSC6.1.1R (Systems and Controls)Supports compliance
SOXSection 404 (Internal Controls)Supports compliance
DORAArticle 9 (ICT Risk Management Framework)Supports compliance
NIST AI RMFMANAGE 2.4 (Risk Tracking)Supports compliance
eIDASArticle 42 (Qualified Electronic Time Stamps)Supports compliance

EU AI Act — Article 12 (Record-Keeping)

Article 12 requires that high-risk AI systems are designed and developed with automatic logging capabilities to ensure traceability. Effective logging depends fundamentally on trusted timestamps and correct event ordering. Logs with manipulable timestamps or ambiguous ordering cannot satisfy the traceability requirement. AG-160 ensures that the temporal foundation of record-keeping is structurally sound, making Article 12 compliance meaningful rather than nominal.

MiFID II — RTS 25 (Clock Synchronisation)

RTS 25 specifies clock synchronisation requirements for trading venues and their members. For algorithmic trading, clocks must be synchronised to UTC within 1 millisecond granularity and 100 microseconds accuracy. AI trading agents fall squarely within these requirements. AG-160's time source governance ensures that agent infrastructure meets or exceeds RTS 25 tolerances.

EMIR — Article 9 (Reporting Obligation)

Derivative transaction reporting under EMIR requires accurate timestamps to correlate reports across counterparties. AI agents executing derivative transactions must generate timestamps that are consistent with counterparty reports and verifiable by trade repositories. Timestamp discrepancies between counterparty reports trigger regulatory queries — AG-160's trusted time governance prevents these discrepancies.

eIDAS — Article 42 (Qualified Electronic Time Stamps)

The eIDAS regulation defines qualified electronic time stamps as having the legal presumption of the accuracy of the date and time they indicate and of the integrity of the data to which the timestamp is bound. For AI agent actions that have legal effect — contract execution, regulatory filings, rights-affecting decisions — qualified electronic timestamps per eIDAS provide the highest level of temporal evidence. AG-160's optional TSA integration (4.9) aligns with eIDAS qualified timestamp requirements.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide — compromised timestamps undermine every governance control that depends on temporal ordering, affecting all agent audit trails simultaneously

Consequence chain: Trusted time failure manifests in three modes. First, timestamp manipulation enables backdating or forward-dating of agent actions, creating fraudulent audit trails that misrepresent when actions occurred. In financial services, this directly enables market manipulation through apparent foreknowledge. Second, replay attacks enable duplication of agent actions — a single authorised payment becomes two, a single data access becomes multiple. The governed exposure scales with the value of the original action and the number of successful replays. An organisation that discovers 6 months of undetected replay attacks faces reconstruction costs, financial losses, and regulatory enforcement. Third, causal ordering failure undermines root cause analysis after incidents: if the order of events cannot be determined, the cause of failures cannot be established, liability cannot be assigned, and remediation cannot be targeted. The compound effect is that without trusted time governance, every other governance control's audit evidence is unreliable — regulators cannot trust the organisation's records, auditors cannot verify control effectiveness, and the organisation itself cannot reconstruct what happened during an incident.

Cite this protocol
AgentGoverning. (2026). AG-160: Trusted Time, Event Ordering and Replay Protection Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-160