AG-494

Vendor Incident Disclosure Governance

Third-Party, Supply Chain & Open Source ~25 min read AGS v2.1 · April 2026
EU AI Act GDPR SOX FCA NIST HIPAA ISO 42001

2. Summary

Vendor Incident Disclosure Governance requires that every organisation deploying AI agents under the Agent Governance Standard establishes and enforces contractual, procedural, and technical mechanisms ensuring that vendors, subprocessors, and upstream service providers disclose security incidents, material operational changes, vulnerability exposures, model behaviour regressions, and compliance failures within defined timeframes and with defined content standards. AI agent pipelines depend on external vendors for inference, data enrichment, embedding generation, tool execution, and numerous other functions — any of which can experience incidents that materially affect the deploying organisation's security posture, data integrity, regulatory compliance, or operational continuity. Without structured disclosure requirements, the deploying organisation operates in an information vacuum: incidents occur at vendor premises, affect the organisation's data and operations, but are never communicated or are communicated too late for effective response. This dimension mandates that vendor incident disclosure is contractually required, technically facilitated, and independently verifiable.

3. Example

Scenario A — Delayed Vendor Breach Disclosure Expands Regulatory Exposure: A customer-facing agent deployed by a European insurance company uses an inference provider for natural language processing of claims submissions. The inference provider experiences a security breach in which an attacker gains read access to the inference API's request and response logs for 11 days. The logs contain 340,000 insurance claims submissions including policyholder names, addresses, claim descriptions (some involving health conditions), and financial amounts. The inference provider discovers the breach on Day 11, patches the vulnerability on Day 12, and begins internal forensic analysis. The inference provider's legal team advises withholding disclosure until the forensic report is complete — a process that takes 38 days. The inference provider notifies the insurance company on Day 50. Under GDPR Article 33, the insurance company as data controller had 72 hours from becoming aware of the breach to notify its supervisory authority. The insurance company notifies the authority on Day 51 — 49 days after the breach was discovered by the entity that experienced it. The supervisory authority determines that the late notification constitutes a GDPR Article 33 violation by the insurance company, which had a contractual obligation to be notified within 24 hours but whose contract with the inference provider specified notification "as soon as reasonably practicable."

What went wrong: The vendor contract used vague disclosure language ("as soon as reasonably practicable") instead of a specific SLA. The inference provider's interpretation of "reasonably practicable" included completing a full forensic investigation before disclosure. No intermediate notification mechanism existed — the inference provider's options were full disclosure or no disclosure, with no provision for preliminary notification. The insurance company had no independent detection capability for vendor-side incidents. Consequence: GDPR Article 33 fine of €1.8 million for late notification, mandatory notification to 340,000 policyholders costing €680,000, reputational damage quantified at €4.2 million in policy cancellations, and termination of the inference provider relationship.

Scenario B — Undisclosed Model Behaviour Regression Causes Systematic Decision Errors: A financial-value agent uses a vendor-provided embedding model for credit risk assessment. The vendor performs a routine model update that introduces a regression: the updated model systematically underweights negative credit signals in borrower applications containing more than 3,000 tokens of supporting documentation. The vendor's internal quality assurance detects a 6% accuracy degradation on its benchmark suite but classifies this as within acceptable drift tolerance and does not disclose the regression to customers. Over 4 months, the financial-value agent approves 2,300 credit applications that would have been declined or flagged under the previous model version. The aggregate exposure from these approvals is £14.7 million. The deploying organisation discovers the regression only when default rates spike 9 months later. A retrospective analysis attributes £8.3 million in losses to the undisclosed model regression.

What went wrong: The vendor disclosure obligation covered security incidents and data breaches but did not extend to model behaviour regressions, accuracy degradation, or material changes to model outputs. The vendor classified the regression as an internal quality issue below its disclosure threshold. No contractual definition existed for what constitutes a "material change" requiring disclosure. The deploying organisation had no independent model performance monitoring that compared vendor model outputs against expected baselines. Consequence: £8.3 million in credit losses, regulatory investigation for inadequate model risk management, £340,000 in remediation costs for retrospective credit review, and mandatory enhancement of vendor model monitoring.

Scenario C — Vendor Suppresses Exploit Disclosure to Avoid Contract Penalties: A safety-critical agent deployed in industrial process control uses a vendor-provided tool execution service for programmable logic controller (PLC) interaction. A security researcher discloses a critical vulnerability to the vendor through a responsible disclosure programme: the tool execution service's API authentication can be bypassed through a crafted header injection, allowing unauthenticated access to PLC command execution. The vendor begins developing a patch but does not notify customers because the vendor contract includes a service-level credit clause that triggers a £50,000 penalty per customer for each disclosed security vulnerability rated "Critical" in any calendar quarter. The vendor has already disclosed one critical vulnerability this quarter. Rather than triggering the financial penalty, the vendor silently patches the vulnerability over 16 days without notifying customers. During the 16-day window, the deploying organisation's safety-critical agent is exposed to an authentication bypass that could allow an attacker to send commands to industrial PLCs. No attack occurs, but the deploying organisation learns of the vulnerability 3 months later through a public CVE disclosure and discovers it was exposed for 16 days without knowledge.

What went wrong: The vendor contract created a perverse incentive — financial penalties for vulnerability disclosure — that directly contradicted the goal of timely incident disclosure. The vendor had a rational economic incentive to suppress disclosure. No contractual safe-harbour provision existed to protect the vendor from penalties when disclosing in good faith. No independent vulnerability monitoring detected the exposure. Consequence: 16-day unmitigated exposure of safety-critical infrastructure, loss of trust in the vendor relationship, mandatory contract restructuring across all vendor agreements, and regulatory inquiry into the deploying organisation's third-party risk management.

4. Requirement Statement

Scope: This dimension applies to every AI agent deployment that depends on any external vendor, service provider, subprocessor, or upstream component provider for inference, model hosting, data processing, tool execution, data enrichment, embedding generation, content filtering, or any other function in the agent pipeline. The term "vendor" in this dimension includes all entities in the processing chain as defined by AG-493 (Subprocessor Governance), including first-tier direct vendors and all deeper-tier subprocessors. The term "incident" encompasses security breaches, data breaches, vulnerability exposures, model behaviour regressions, material operational changes, service degradation events, compliance failures, regulatory actions, and any other event at the vendor that could materially affect the deploying organisation's security posture, data integrity, regulatory compliance, operational continuity, or agent output quality. Organisations that operate AI agents with no external vendor dependencies are exempt, but must re-assess if any external integration is added.

4.1. A conforming system MUST require, through contractual terms, that every vendor in the agent processing chain discloses security incidents, data breaches, and vulnerability exposures within a defined SLA — maximum 24 hours from vendor awareness for Critical severity events, maximum 48 hours for High severity events, and maximum 5 business days for Medium severity events — as classified under the organisation's adverse event severity matrix (aligned with AG-419).

4.2. A conforming system MUST require, through contractual terms, that every vendor discloses material changes to model behaviour, model versions, inference infrastructure, data processing pipelines, or any other component that could alter the quality, accuracy, or characteristics of the service consumed by the agent — with disclosure occurring before the change takes effect for planned changes and within 48 hours for unplanned changes.

4.3. A conforming system MUST define a structured disclosure format specifying the minimum content of a vendor incident notification: incident identifier, date and time of discovery, affected services, affected data categories, estimated scope of impact, root cause (if known), interim mitigations applied, timeline for resolution, and contact details for the vendor incident team.

4.4. A conforming system MUST establish a dedicated, tested intake channel for receiving vendor incident disclosures — separate from general vendor communication channels — that is monitored continuously (24/7 for Critical and High severity) and routes notifications to the appropriate incident response team (aligned with AG-424).

4.5. A conforming system MUST verify vendor disclosure compliance through at least one independent mechanism: vendor incident disclosure audits, threat intelligence monitoring for vendor-related events, or contractual requirements for vendors to provide periodic incident disclosure completeness attestations.

4.6. A conforming system MUST prohibit contractual terms that create disincentives for vendor incident disclosure — including financial penalties triggered by disclosure volume, severity-based penalty escalation that punishes the act of disclosing rather than the act of having an incident, or clauses that allow the deploying organisation to terminate solely because a vendor disclosed an incident. A contractual safe-harbour provision MUST protect vendors from penalties specifically triggered by timely, good-faith disclosure.

4.7. A conforming system MUST maintain an incident disclosure log recording all vendor disclosures received, the time between vendor awareness and disclosure (where determinable), the response actions taken by the deploying organisation, and the resolution status of each disclosed incident.

4.8. A conforming system SHOULD implement automated correlation between vendor incident disclosures and the deploying organisation's own monitoring data, detecting discrepancies between what the vendor reports and what the organisation observes (e.g., the vendor reports no data exposure, but the organisation's data lineage shows that exposed systems processed its data during the incident window).

4.9. A conforming system SHOULD establish bilateral incident disclosure obligations — committing the deploying organisation to disclose to the vendor any incidents at the deploying organisation that could affect the vendor's infrastructure or other customers, creating a mutual disclosure relationship rather than a one-directional requirement.

4.10. A conforming system SHOULD implement vendor incident simulation exercises at least annually, testing the end-to-end disclosure and response workflow: vendor sends a simulated disclosure, the intake channel receives and routes it, the incident response team evaluates and acts, and lessons learned are documented.

4.11. A conforming system MAY implement vendor security posture monitoring — continuous external assessment of vendor security indicators (certificate management, DNS security, public vulnerability disclosures, dark web monitoring for vendor data) — to provide early warning of potential incidents before vendor disclosure.

5. Rationale

The deploying organisation's security perimeter, in the context of AI agent deployments, extends far beyond the organisation's own infrastructure. Every vendor in the agent processing chain is an extension of the deploying organisation's attack surface, data handling environment, and operational infrastructure. An incident at any vendor in the chain can compromise the deploying organisation's data, affect the quality or safety of agent outputs, trigger regulatory obligations, and damage customer trust. The deploying organisation's ability to respond to these incidents depends entirely on whether and when the vendor discloses them.

Three structural factors make vendor incident disclosure governance essential for AI agent deployments specifically — beyond the general case for vendor risk management.

First, the data sensitivity and volume flowing through AI agent pipelines is exceptionally high. Agent inputs routinely include personal data, financial data, health data, and proprietary business information. Agent outputs include decisions, recommendations, and actions with direct consequences for individuals and organisations. Inference telemetry may reveal business logic, customer behaviour patterns, and operational strategies. A security breach at an inference provider is not analogous to a breach at a commodity SaaS tool — it potentially exposes the substance of every interaction processed through that provider. The deploying organisation cannot assess its exposure or discharge its regulatory obligations without timely, detailed disclosure from the vendor.

Second, AI model behaviour is not static, and changes in model behaviour can be as consequential as security breaches. When a vendor updates a model version, changes inference infrastructure, modifies content filtering rules, or alters tokenisation, the outputs consumed by the deploying organisation's agents may change materially. A model regression that systematically underweights negative signals (Scenario B) is not a security incident in the traditional sense, but its financial and regulatory consequences can exceed those of a data breach. Traditional vendor incident disclosure frameworks, designed for security incidents, do not capture model behaviour changes. AG-494 extends the disclosure obligation to cover any material change that could affect agent output quality or characteristics.

Third, the regulatory environment increasingly holds deploying organisations accountable for vendor incidents regardless of whether the deploying organisation knew about the incident. Under GDPR Article 33, the 72-hour notification clock starts from the controller's awareness, but supervisory authorities assess whether the controller had adequate mechanisms to become aware promptly. Under the EU AI Act, deployers of high-risk AI systems must monitor system performance — which requires knowledge of upstream changes that could affect performance. Under DORA, financial entities must manage ICT third-party risk including incident reporting from third-party providers. In each case, the regulatory expectation is that the deploying organisation has established mechanisms to ensure timely vendor disclosure — not merely that it responds promptly when disclosure happens to arrive.

The perverse incentive problem illustrated in Scenario C deserves specific attention. Vendor contracts that penalise disclosure create rational economic incentives for vendors to suppress or delay incident notifications. This is not a theoretical risk — it is a predictable consequence of poorly structured contractual incentives. If a vendor faces a £50,000 penalty for disclosing a critical vulnerability, the vendor's rational calculation is to suppress disclosure if the probability of independent discovery is low and the expected cost of suppression (reputational damage if discovered, contract termination) is less than £50,000. AG-494 requires contractual safe-harbour provisions that eliminate this perverse incentive, ensuring that vendors are never financially worse off for disclosing than for suppressing.

The combination of contractual requirements, structured disclosure formats, dedicated intake channels, independent verification, and safe-harbour provisions creates a disclosure governance framework that addresses the full spectrum of vendor incident risk — from traditional security breaches to model behaviour regressions to perverse incentive structures.

6. Implementation Guidance

Vendor incident disclosure governance requires contractual, procedural, and technical measures working in concert. The contractual layer defines obligations and incentives. The procedural layer defines workflows and responsibilities. The technical layer provides channels, automation, and verification.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Financial Services. DORA Article 19 requires ICT-related incident reporting from financial entities, and Articles 28-30 require contractual provisions for third-party ICT incident notification. Financial institutions should align AG-494 disclosure SLAs with DORA reporting timelines. The 24-hour SLA for Critical events provides the upstream notification needed to meet DORA's initial notification deadline. Financial institutions should also consider the intersection with DORA's direct oversight framework for critical ICT third-party service providers, where regulatory authorities may have independent incident information that can be used for verification.

Healthcare. Vendor incidents involving protected health information trigger notification obligations under HIPAA (US) and equivalent health data breach notification laws. Healthcare organisations should ensure that vendor disclosure content includes sufficient detail to determine whether a HIPAA breach notification is required — specifically, whether unsecured protected health information was accessed, acquired, used, or disclosed. The 24-hour Critical SLA is essential for healthcare deployments, as HIPAA's 60-day notification deadline runs from the date of discovery, and delayed vendor disclosure compresses the healthcare organisation's response timeline.

Public Sector. Government agencies may be subject to mandatory incident reporting to national cybersecurity authorities (e.g., CISA in the US, NCSC in the UK, BSI in Germany) with defined timelines. Vendor incident disclosures must arrive early enough to permit the agency to assess, investigate, and report within these mandatory windows. Agencies deploying agents handling classified information must also consider whether vendor incidents trigger classified incident response protocols.

Crypto/Web3. Vendor incidents in crypto and Web3 contexts can have immediate and irreversible financial consequences — a compromised tool execution service could enable unauthorised transactions that cannot be reversed on-chain. The 24-hour SLA for Critical events may be insufficient; crypto deployments should consider real-time or near-real-time disclosure requirements for incidents that could enable asset theft or unauthorised transaction execution.

Maturity Model

Basic Implementation — The organisation has contractual incident disclosure requirements with all first-tier vendors, including defined SLAs for Critical, High, and Medium severity events. A dedicated intake channel exists and is monitored during business hours (24/7 for Critical). A structured disclosure format specifies minimum notification content. Vendor contracts include safe-harbour provisions protecting good-faith disclosure. An incident disclosure log records all notifications received. This level meets the minimum mandatory requirements.

Intermediate Implementation — All basic capabilities plus: contractual disclosure extends to second-tier and deeper-tier subprocessors through flow-down clauses. The intake channel supports machine-readable submissions with automated routing per AG-424. Independent verification through threat intelligence correlation provides a check on vendor disclosure completeness. Annual vendor incident simulation exercises test the end-to-end workflow. Disclosure trend analysis is conducted quarterly. Disclosure obligations explicitly cover model behaviour changes, not only security incidents. Bilateral disclosure obligations create mutual transparency.

Advanced Implementation — All intermediate capabilities plus: real-time vendor security posture monitoring provides early warning before vendor disclosure. Automated correlation between vendor disclosures and the organisation's own monitoring data detects discrepancies in vendor-reported impact. The disclosure log is integrated with the organisation's enterprise incident management system, enabling cross-incident analysis and pattern detection. Independent audits verify vendor disclosure completeness by comparing the organisation's disclosure log against the vendor's internal incident register (through audit rights). The organisation can demonstrate, through evidence, that every material vendor event affecting its agent deployments was disclosed within the contractual SLA.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Contractual Disclosure SLA Presence

Test 8.2: Intake Channel Availability and Monitoring

Test 8.3: Disclosure Content Completeness

Test 8.4: Disclosure SLA Compliance Measurement

Test 8.5: Safe-Harbour Provision Enforcement

Test 8.6: Independent Verification Effectiveness

Test 8.7: Incident Disclosure Log Completeness and Accuracy

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 9 (Risk Management System)Supports compliance
EU AI ActArticle 62 (Post-Market Monitoring)Direct requirement
GDPRArticle 33 (Notification of a Personal Data Breach to the Supervisory Authority)Direct requirement
GDPRArticle 28(3)(f) (Processor Obligations — Breach Notification)Direct requirement
SOXSection 302/404 (Internal Controls)Supports compliance
FCA SYSC11.1 (Reporting Requirements)Supports compliance
NIST AI RMFMANAGE 4.1, MANAGE 4.2, GOVERN 5.2Supports compliance
ISO 42001Clause 9.1 (Monitoring, Measurement, Analysis and Evaluation)Supports compliance
DORAArticle 19 (Reporting of Major ICT-Related Incidents)Direct requirement

GDPR — Article 33 (Notification of a Personal Data Breach to the Supervisory Authority)

Article 33 requires that the controller notify the supervisory authority of a personal data breach "without undue delay and, where feasible, not later than 72 hours after having become aware of it." The controller's ability to comply with this 72-hour deadline depends directly on when the controller becomes aware of breaches occurring at its vendors and processors. GDPR Article 28(3)(f) explicitly requires that the processor assist the controller in ensuring compliance with Articles 33 and 34, "taking into account the nature of processing and the information available to the processor." AG-494's requirement for 24-hour disclosure of Critical events ensures that the controller receives breach notification from its vendors with sufficient lead time to assess the breach, determine whether the notification threshold under Article 33 is met, and submit the supervisory authority notification within 72 hours. Without AG-494's structured disclosure framework, the controller's 72-hour window begins only when it happens to learn of the breach — which, as Scenario A demonstrates, can be weeks or months after the breach occurred.

DORA — Article 19 (Reporting of Major ICT-Related Incidents)

DORA requires financial entities to report major ICT-related incidents to competent authorities, with an initial notification "without undue delay" and a detailed report within specific timeframes. For financial entities that depend on vendor-provided AI agent infrastructure, the ability to meet DORA reporting timelines depends on vendor disclosure timeliness. AG-494's tiered SLA structure directly supports DORA compliance: the 24-hour Critical disclosure SLA provides upstream notification that enables the financial entity to submit its initial notification to the competent authority within DORA's expected timeframes. DORA Articles 28-30 further require that contractual arrangements with ICT third-party service providers include provisions for incident reporting — AG-494's contractual disclosure requirements fulfil this obligation.

EU AI Act — Article 62 (Post-Market Monitoring)

The AI Act requires providers and deployers of high-risk AI systems to implement post-market monitoring systems that actively and systematically collect, document, and analyse relevant data about the AI system's performance throughout its lifetime. For deployers, this includes monitoring for changes in upstream components that could affect system performance. Vendor incident disclosure — particularly disclosure of model behaviour regressions (Requirement 4.2) — is a critical input to the post-market monitoring system. Without vendor disclosure of material changes, the deployer's monitoring system has a blind spot for upstream changes that affect agent performance. AG-494 ensures that the deployer's post-market monitoring system receives timely information about vendor-side events that could affect the high-risk AI system's performance, accuracy, or safety characteristics.

SOX — Sections 302/404 (Internal Controls)

Financial reporting controls that rely on AI agent pipelines are dependent on the integrity of vendor-provided services in those pipelines. A vendor incident that corrupts data, introduces errors, or compromises the integrity of a financial processing agent directly threatens the reliability of financial reporting. SOX compliance requires that internal controls over financial reporting are effective, which in turn requires that the organisation has timely visibility into vendor incidents that could compromise those controls. AG-494's disclosure framework ensures that financial-value agent deployments have the vendor incident visibility needed to assess the ongoing effectiveness of financial reporting controls.

FCA SYSC — 11.1 (Reporting Requirements)

The FCA expects firms to have adequate systems and controls for identifying, monitoring, and reporting incidents. For firms using AI agents, this includes incidents at vendors that affect the firm's operations. AG-494's incident disclosure governance ensures that vendor incidents are communicated to the firm within timeframes that enable the firm to meet its own reporting obligations to the FCA. The structured disclosure format also ensures that the firm receives sufficient detail to assess materiality and determine whether FCA notification is required.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide — delayed or suppressed vendor disclosure affects every agent deployment, data subject, and business process that depends on the affected vendor, with regulatory consequences potentially spanning multiple jurisdictions simultaneously

Consequence chain: The failure sequence begins with an incident occurring at a vendor in the agent processing chain — a security breach, a model regression, a vulnerability exposure, or a material operational change. Without effective disclosure governance, the incident remains invisible to the deploying organisation. The immediate consequence is an unmitigated exposure window: the deploying organisation's agents continue to operate through compromised infrastructure, consuming degraded or corrupted outputs, or processing data through breached systems, without any defensive response. The exposure window continues indefinitely until the incident is discovered through an independent channel — which, as demonstrated across all three scenarios, can take weeks to months. During the exposure window, the accumulation of harm is continuous and compounding: more records are exposed (Scenario A: 340,000 records over 11 days), more erroneous decisions are made (Scenario B: 2,300 faulty credit approvals over 4 months), or more time passes with unmitigated critical vulnerabilities (Scenario C: 16 days of authentication bypass on safety-critical infrastructure). When the incident is eventually discovered, the deploying organisation faces a compressed response timeline: regulatory notifications are already overdue, affected data subjects must be notified retrospectively for a much larger population than would have been affected with timely disclosure, and remediation must address months of accumulated impact rather than hours. The regulatory consequence is multiplicative: not only did the incident occur, but the deploying organisation failed to detect it in a timely manner, failed to notify regulators within mandatory windows, and failed to mitigate impact through prompt response — each failure compounding the regulatory exposure. The ultimate business consequence includes regulatory fines, customer notification costs, remediation expenditure, reputational damage, and — most critically — loss of the organisation's credibility as a responsible deployer of AI agents.

Cross-references: AG-419 (Adverse Event Severity Matrix Governance), AG-423 (Incident Learning Closure Governance), AG-424 (Notification Routing Governance), AG-427 (Mutual Aid and Vendor Coordination Governance), AG-490 (Maintainer Trust and Project Health Governance), AG-491 (Dependency Provenance and SBOM Attestation Governance), AG-493 (Subprocessor Governance), AG-497 (End-of-Support Migration Governance).

Cite this protocol
AgentGoverning. (2026). AG-494: Vendor Incident Disclosure Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-494