AG-531

Maintenance Work-Order Authenticity Governance

Energy, Utilities & Industrial Operations ~22 min read AGS v2.1 · April 2026
EU AI Act SOX NIST ISO 42001

2. Summary

Maintenance Work-Order Authenticity Governance requires that AI agents operating in energy, utilities, and industrial environments cryptographically verify the authenticity, integrity, and authorisation chain of every maintenance work order before taking any action upon it — including issuing commands, scheduling resources, unlocking interlocks, or modifying operational parameters. Falsified, tampered, or unauthorised work orders in industrial environments can cause safety-critical failures: an agent that actions a spoofed work order to de-energise a live transmission line, open a pressure relief valve on an operating reactor vessel, or disable a safety instrumented system creates immediate risk to human life and physical infrastructure. This dimension mandates end-to-end work-order verification from origination through approval to execution, ensuring that no maintenance action proceeds on the basis of an unverified instruction.

3. Example

Scenario A — Spoofed Work Order Causes Unplanned Steam Turbine Trip: A combined-cycle gas turbine plant operates a 450 MW unit supplying baseload power to a regional grid. An AI agent manages maintenance scheduling and coordinates with the distributed control system to place equipment in maintenance-ready states. An attacker with access to the plant's enterprise network crafts a work order mimicking the format of the computerised maintenance management system, instructing the agent to open turbine bypass valves and initiate a controlled shutdown for "emergency bearing inspection." The work order carries a forged approver signature using credentials obtained through a phishing campaign three weeks earlier. The agent processes the work order without verifying the digital signature against the current certificate revocation list or confirming the approval chain through an out-of-band channel. The turbine trips, causing a 450 MW loss to the grid. The grid operator imposes a £2.3 million imbalance penalty. The unplanned thermal cycle costs £680,000 in accelerated maintenance on the hot gas path components. Total financial impact: £2.98 million. Investigation reveals no legitimate work order existed.

What went wrong: The agent accepted a work order based on format matching and a static signature check without verifying signature validity against revocation lists, confirming the approval chain through independent channels, or cross-referencing the work order against the plant's approved maintenance schedule. The forged work order was syntactically correct but cryptographically unverifiable. No out-of-band confirmation was required for safety-critical maintenance actions.

Scenario B — Tampered Work Order Modifies Safety Relief Valve Setpoint: A petrochemical refinery operates a fluid catalytic cracking unit with a design pressure of 42 bar. A legitimate work order is issued for routine inspection of a pressure safety valve, requiring the valve to be isolated and tested at its rated setpoint of 46.2 bar. The work order traverses the plant's integration middleware between the maintenance management system and the agent's task queue. During transit, a compromised middleware component modifies the work order: the test setpoint is changed from 46.2 bar to 52.0 bar — above the vessel's maximum allowable working pressure. The agent receives the tampered work order, accepts it as authentic because the originating system signature is valid (the tampering occurred after signing), and instructs the valve test bench to pressurize to 52.0 bar. The vessel's independent high-pressure trip intervenes at 48.5 bar, preventing catastrophic failure, but the over-pressure event triggers a mandatory regulatory shutdown. The refinery loses 12 days of production at a gross margin of £1.4 million per day. Total cost: £16.8 million in lost production plus £430,000 in regulatory investigation and remediation.

What went wrong: The work order's digital signature was validated against the originating system, but the integrity of the work order content was not verified end-to-end. The middleware modification occurred after the original signature was applied, and no mechanism detected the in-transit tampering. The agent trusted the content because the origin was authentic, conflating origin authenticity with content integrity. No independent bounds-checking compared the requested setpoint against the vessel's design parameters.

Scenario C — Expired Authorisation Permits After-Hours Scaffold Removal: A nuclear power station operates under strict work control procedures. A maintenance work order authorising scaffold removal from the reactor building crane hall was issued 14 days earlier with a validity window of 7 days. The work order expired because the scaffold removal was delayed by a refuelling outage extension. An AI agent managing the plant's work management backlog identifies the expired work order in the pending queue and, because its validation logic checks only for the presence of an authorisation signature without verifying temporal validity, schedules the scaffold removal for the night shift. The scaffold is partially dismantled before a shift supervisor discovers that the crane hall exclusion zone has been re-established for fuel flask movements occurring during the night shift — movements that were scheduled after the original work order was issued. The scaffold removal crew is evacuated. The near-miss event triggers a mandatory report to the nuclear regulator. Regulatory investigation costs £890,000 and imposes a 3-month enhanced regulatory inspection regime costing an additional £1.2 million in compliance overhead.

What went wrong: The agent validated the work order's authorisation signature without checking the temporal validity window. The expired work order no longer reflected current plant conditions — the exclusion zone for fuel flask movements was established after the original work order was issued. Work-order authenticity requires not only cryptographic validity but also temporal validity and cross-reference against current plant state.

4. Requirement Statement

Scope: This dimension applies to any AI agent that receives, processes, schedules, dispatches, or executes maintenance work orders in energy, utility, or industrial environments. The scope encompasses all forms of maintenance instruction — planned preventive maintenance, corrective maintenance, condition-based maintenance triggered by monitoring systems, and emergency maintenance orders. It applies regardless of the work order's originating system (computerised maintenance management systems, enterprise asset management platforms, handwritten-to-digital conversion systems, or direct operator instruction channels). The scope includes work orders that the agent originates itself based on predictive analytics or condition monitoring, which must undergo the same authenticity and approval verification before execution. Agents that only display or report work orders without taking any action upon them are minimally affected but SHOULD still verify authenticity to prevent operators from acting on displayed fraudulent orders.

4.1. A conforming system MUST cryptographically verify the digital signature of every maintenance work order before taking any action upon it, using current certificate validity status including revocation list checks performed no more than 4 hours before the verification event.

4.2. A conforming system MUST verify the end-to-end integrity of work-order content from origination through all intermediate systems to the point of execution, detecting any modification that occurred after the authorising signature was applied.

4.3. A conforming system MUST validate the temporal validity of every work order, confirming that the current time falls within the work order's authorised execution window and that no subsequent plant-state changes have invalidated the work order's preconditions.

4.4. A conforming system MUST verify the approval chain of every work order against the organisation's current authorisation matrix, confirming that each required approver held the necessary authority at the time of approval and that no approvals have been revoked or suspended.

4.5. A conforming system MUST cross-reference safety-critical work orders against the current plant operating state, confirming that the requested maintenance action is compatible with the current operational mode, active exclusion zones, concurrent work activities, and safety system configurations.

4.6. A conforming system MUST implement out-of-band confirmation for work orders that require safety system disablement, interlock bypass, or operating envelope modification, obtaining confirmation through a communication channel independent of the channel that delivered the work order.

4.7. A conforming system MUST maintain a tamper-evident audit log of every work-order verification decision, recording the work order identifier, the verification checks performed, the results of each check, the final accept/reject decision, and the timestamp — with logs retained in accordance with Section 7.

4.8. A conforming system SHOULD implement anomaly detection for work-order patterns, identifying orders that deviate from historical maintenance patterns (unusual equipment targets, atypical timing, abnormal scope, unexpected approvers) and flagging them for enhanced verification.

4.9. A conforming system SHOULD implement automated bounds-checking that compares work-order parameters (setpoints, pressures, temperatures, flow rates, voltages) against the target equipment's design limits and current operating envelope per AG-530.

4.10. A conforming system MAY implement predictive work-order correlation, verifying that maintenance work orders align with condition-monitoring data and predictive maintenance models — flagging work orders for equipment that shows no degradation indicators as potentially anomalous.

5. Rationale

Maintenance work orders are the primary mechanism through which physical changes are authorised and executed in industrial environments. Every significant change to plant state — isolating equipment, modifying setpoints, disabling safety systems, opening pressure boundaries, de-energising circuits — originates as or is governed by a work order. In environments where AI agents manage or execute maintenance activities, the work order becomes the instruction set that drives physical action. The authenticity of that instruction set is therefore a safety-critical property.

The threat model for work-order authenticity encompasses three attack vectors. First, fabrication: an attacker creates a work order that never existed in the legitimate maintenance management system. This is the classic spoofing attack, equivalent to forging a physician's prescription or a court order. Second, tampering: an attacker modifies a legitimate work order in transit between the originating system and the executing agent. The work order is genuine in origin but corrupted in content — the most dangerous variant because origin-based authentication will pass while the content is malicious. Third, replay and temporal abuse: an attacker resubmits a previously valid work order that has expired, been superseded, or whose preconditions no longer hold. The work order was once legitimate but is no longer appropriate for current plant conditions.

Industrial environments have historically relied on human verification — shift supervisors reviewing paper work orders, cross-checking against the daily work schedule, and confirming isolation states through physical walkdowns. AI agents that automate work-order processing must replicate and exceed this verification capability. A human supervisor who receives a work order to de-energise a busbar will typically check: Is this work order expected? Does it match today's schedule? Is the approval signature from someone I recognise? Are the preconditions met — is the load transferred, are the downstream consumers notified? An AI agent must perform equivalent checks through cryptographic and data-driven mechanisms rather than experiential judgement.

The regulatory context reinforces the requirement. IEC 62443 (Industrial Automation and Control Systems Security) mandates integrity verification for commands that affect safety functions. The EU AI Act classifies AI systems managing critical infrastructure as high-risk, requiring accuracy, robustness, and cybersecurity measures. Nuclear and oil-and-gas sector regulations impose specific work-control requirements that AI agents must satisfy. NERC CIP standards for the electricity sector mandate authentication and authorisation for commands affecting bulk electric system reliability. The convergence of IT and OT networks — with maintenance management systems increasingly connected to operational technology through integration middleware — creates new attack surfaces that traditional work-control procedures were not designed to address.

The financial and safety consequences of work-order authenticity failures are severe. An unauthorised turbine trip can cost millions in grid imbalance penalties and accelerated maintenance. A tampered pressure setpoint can cause catastrophic vessel failure. An expired work order can place workers in danger from concurrent activities. These are not theoretical risks — they are the operational reality of industrial environments where maintenance errors and deliberate attacks have caused explosions, blackouts, environmental releases, and fatalities.

6. Implementation Guidance

Maintenance Work-Order Authenticity Governance requires a layered verification architecture that validates work orders at multiple levels: cryptographic authenticity, content integrity, temporal validity, authorisation chain, and operational compatibility. No single verification mechanism is sufficient — each addresses a different attack vector, and all must pass before a work order is actioned.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Nuclear Power. Nuclear facilities operate under the most stringent work-control regimes in any industry. Work orders must comply with nuclear safety case requirements, and any AI agent participating in work management must satisfy the nuclear regulator's expectations for software used in safety-related applications. The temporal validity requirement is particularly critical in nuclear environments where plant conditions change frequently during outages and refuelling operations. Agents must cross-reference work orders against the current nuclear safety case and outage schedule.

Oil and Gas. Petrochemical and upstream oil-and-gas environments involve work orders that can affect pressure boundaries, flammable inventories, and toxic release scenarios. The bounds-checking requirement (4.9) is essential: work-order parameters must be compared against the equipment's design limits and the current process conditions. A work order to increase a compressor setpoint must be validated against the downstream vessel's maximum allowable working pressure, the relief valve capacity, and the current process gas composition.

Electricity Transmission and Distribution. Grid operators face unique challenges with work-order authenticity because maintenance actions on transmission assets can affect grid stability across wide areas. NERC CIP compliance requires authentication of commands affecting bulk electric system reliability. Work orders for switching operations must be cross-referenced against the current network topology and load flow conditions to prevent inadvertent islanding or overloading.

Water and Wastewater. Water utilities manage work orders that can affect treatment chemical dosing, disinfection processes, and distribution system pressure. A tampered work order modifying chlorine dosing parameters could affect public health. Work-order bounds-checking must include water quality parameter limits and regulatory compliance thresholds.

Maturity Model

Basic Implementation — The organisation cryptographically signs all maintenance work orders at origination and verifies signatures at the point of agent processing. Certificate revocation checking is performed with a defined staleness limit. Temporal validity windows are enforced computationally. An audit log records all verification decisions. This level meets the minimum mandatory requirements and addresses fabrication and replay attacks.

Intermediate Implementation — All basic capabilities plus: end-to-end content integrity verification detects in-transit tampering. Approval chain verification checks against the live authorisation matrix. Cross-reference against current plant operating state validates operational compatibility. Anomaly detection identifies work orders deviating from historical patterns. Out-of-band confirmation is required for safety-critical actions.

Advanced Implementation — All intermediate capabilities plus: automated bounds-checking validates work-order parameters against equipment design limits and the current operating envelope per AG-530. Predictive correlation verifies alignment between work orders and condition-monitoring data. The organisation can demonstrate through adversarial testing that fabricated, tampered, expired, and anomalous work orders are reliably detected and rejected. Real-time dashboards provide visibility into work-order verification status across all plant areas.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Fabricated Work-Order Rejection

Test 8.2: In-Transit Tampering Detection

Test 8.3: Temporal Validity Enforcement

Test 8.4: Approval Chain Verification Against Live Matrix

Test 8.5: Out-of-Band Confirmation for Safety-Critical Actions

Test 8.6: Audit Trail Completeness and Tamper Evidence

Test 8.7: Bounds-Checking Against Equipment Design Limits

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 9 (Risk Management System)Supports compliance
EU AI ActArticle 15 (Accuracy, Robustness and Cybersecurity)Direct requirement
IEC 62443SR 3.1 (Communication Integrity), SR 1.3 (System Authentication)Direct requirement
SOXSection 404 (Internal Controls Over Financial Reporting)Supports compliance
NIST AI RMFGOVERN 1.2, MANAGE 2.2, MAP 3.4Supports compliance
ISO 42001Clause 6.1 (Actions to Address Risks), Clause 8.4 (Operation of AI System)Supports compliance
DORAArticle 9 (ICT Risk Management Framework), Article 11 (ICT Change Management)Supports compliance

EU AI Act — Article 15 (Accuracy, Robustness and Cybersecurity)

Article 15 requires that high-risk AI systems achieve appropriate levels of accuracy, robustness, and cybersecurity. An AI agent managing industrial maintenance that cannot verify the authenticity of the instructions it executes fails all three criteria: accuracy is compromised when tampered parameters drive incorrect actions, robustness is absent when fabricated orders are accepted, and cybersecurity is inadequate when the system cannot distinguish legitimate from malicious instructions. AI systems managing critical infrastructure maintenance are classified as high-risk under Annex III. Organisations must demonstrate that their maintenance management agents verify every work order through cryptographic and procedural mechanisms before taking physical action.

IEC 62443 — SR 3.1 (Communication Integrity) and SR 1.3 (System Authentication)

IEC 62443 mandates communication integrity for industrial automation and control systems, specifically requiring mechanisms to detect modification of transmitted data. Work orders transmitted between enterprise systems and operational technology agents are exactly the type of inter-zone communication that IEC 62443 is designed to protect. SR 3.1 requires integrity protection for data in transit — directly mapping to the end-to-end content integrity requirement (4.2). SR 1.3 requires authentication of all users, services, and applications before granting access to system functions — directly mapping to the approval chain verification requirement (4.4). AG-531 operationalises these IEC 62443 requirements for AI agents in OT environments.

SOX — Section 404 (Internal Controls Over Financial Reporting)

While SOX primarily addresses financial reporting, maintenance work orders in energy and utility companies have direct financial implications — maintenance costs, outage scheduling, and capital expenditure authorisation. A falsified work order that triggers an unplanned outage (Scenario A: £2.98 million) or a tampered work order that causes a regulatory shutdown (Scenario B: £17.23 million total) represents a material financial event. SOX-compliant organisations must demonstrate that internal controls prevent unauthorised financial commitments, and maintenance work-order verification is a critical control in asset-intensive industries.

NIST AI RMF — GOVERN 1.2, MANAGE 2.2, MAP 3.4

The NIST AI Risk Management Framework calls for governance mechanisms proportionate to the risk level of AI systems. MAP 3.4 addresses the identification of risks related to AI system interactions with physical systems — directly applicable to agents executing maintenance work orders on physical plant. MANAGE 2.2 requires mechanisms to monitor and manage identified risks. Work-order authenticity verification is a risk management mechanism for the specific risk of AI agents executing unauthorised physical changes.

ISO 42001 — Clause 6.1, Clause 8.4

ISO 42001 requires organisations to identify risks associated with AI system operation and implement controls to address them. Clause 8.4 specifically addresses the operation of AI systems, requiring that operational controls ensure AI systems function within defined parameters. Work-order authenticity verification ensures that the instructions driving AI agent behaviour in industrial environments are legitimate, unmodified, and currently authorised — a fundamental operational control.

DORA — Article 9, Article 11

The Digital Operational Resilience Act applies to financial entities, but energy and utility companies that are critical third-party ICT service providers to financial entities fall within DORA's extended scope. Article 9 requires ICT risk management frameworks that identify and protect against ICT-related threats. Article 11 requires ICT change management processes. Maintenance work orders are a form of change management instruction, and their authenticity is a prerequisite for reliable ICT change management in industrial environments.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusPlant-wide to grid-wide; potential for loss of life, environmental release, multi-million-pound financial loss, and cascading infrastructure failure

Consequence chain: An unverified or falsified maintenance work order is accepted by the AI agent, which initiates physical actions based on fraudulent instructions. The immediate technical failure is the execution of an unauthorised maintenance action — equipment is isolated that should remain in service, setpoints are modified beyond safe limits, safety systems are disabled without proper preconditions, or maintenance crews are dispatched into hazardous zones without adequate protection. The operational impact escalates through the physical process: an unauthorised turbine trip propagates through the grid as a frequency disturbance affecting downstream consumers (Scenario A); an over-pressure event threatens vessel integrity and triggers emergency protective actions (Scenario B); an expired work order places workers in proximity to moving heavy loads (Scenario C). The business consequence includes regulatory enforcement — mandatory shutdown orders, enhanced inspection regimes, potential prosecution under health and safety legislation — combined with financial loss from unplanned outages, equipment damage, regulatory penalties, and reputational harm. In the worst case, a falsified work order that disables a safety instrumented system and modifies an operating parameter beyond safe limits can cause a loss-of-containment event with potential for explosion, toxic release, or fatality. The blast radius extends beyond the plant boundary: grid-connected facilities affect electricity consumers across the region, petrochemical facilities affect surrounding communities through air quality and evacuation requirements, and nuclear facilities trigger national-level regulatory response. This severity rating reflects the direct causal path from a digital verification failure to physical harm.

Cross-references: AG-005 (Instruction Integrity Verification), AG-006 (Tamper-Evident Record Integrity), AG-530 (Plant Operating Envelope Governance), AG-532 (ICS Command Interlock Governance), AG-538 (OT Patch Window Governance), AG-370 (Tool Schema Integrity Governance), AG-466 (Invoice Authenticity Verification Governance), AG-429 (Social Engineering Attack Simulation Governance).

Cite this protocol
AgentGoverning. (2026). AG-531: Maintenance Work-Order Authenticity Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-531