AG-596

Fleet Firmware Trust Governance

Robotics, Edge, IoT & Spatial Computing ~24 min read AGS v2.1 · April 2026
EU AI Act NIST ISO 42001

Section 2: Summary

This dimension governs the processes, technical controls, and organisational accountability structures that ensure firmware deployed across a fleet of autonomous, robotic, edge, or IoT devices originates from a verified, authorised source, has not been tampered with in transit or at rest, and can be safely applied, rolled back, or quarantined without inducing unsafe physical or operational states. Firmware is the lowest-level executable code that governs device behaviour, sensor fusion, actuation logic, and communication protocols; a compromised or malformed firmware image is therefore not merely a software defect but a physical-world safety hazard capable of disabling safety interlocks, falsifying sensor readings, overriding human commands, or converting a fleet of cooperative machines into coordinated attack vectors. Failure in this dimension manifests as mass device compromise following a single supply-chain injection, physical injury or infrastructure damage caused by actuation errors introduced through a malicious update, regulatory shutdown of an entire deployment due to inability to demonstrate firmware provenance, or protracted operational downtime when a faulty update propagates to thousands of devices simultaneously without a functioning rollback path.

Section 3: Examples

Example A — Industrial Robot Fleet Bricking via Unsigned Update (Manufacturing, 3,200 Units)

A tier-one automotive parts manufacturer operates 3,200 articulated robotic welding arms across four production facilities. The firmware distribution server is compromised through a credential-stuffing attack on a contractor account that had been granted write access to the update repository. The attacker replaces a scheduled motion-controller firmware package with a modified image that disables the force-torque feedback loop responsible for detecting unexpected resistance during arm movement. The modified image carries a self-signed certificate issued by the attacker rather than the manufacturer's hardware security module (HSM)-anchored root of trust. Because the fleet's over-the-air (OTA) update pipeline validates only the presence of a certificate, not membership in a trusted certificate chain, the update is accepted and staged across all 3,200 units during a maintenance window. Forty-seven units deploy the update before a shift supervisor notices anomalous motion behaviour and raises an emergency stop. The remaining 3,153 units are quarantined in the staged state. Recovery requires manual re-flashing of the 47 deployed units, a 19-hour production halt across all four facilities, physical inspection of every arm for mechanical damage caused during the window of abnormal operation, and a regulator-mandated audit of the entire OTA pipeline. Direct production losses exceed €4.2 million. Three workers sustain minor injuries from unexpected arm movements before emergency stops engage. The root cause is the absence of cryptographic chain-of-trust validation and the absence of canary-rollout gating that would have limited initial deployment to a small subset of devices.

Example B — Medical Device Firmware Injection via Compromised Vendor SDK (Hospital Network, 680 Infusion Pumps)

A regional hospital network deploys 680 smart infusion pumps across twelve wards. The pumps receive firmware updates through a vendor-supplied SDK integrated into the hospital's device management platform. A vulnerability in the SDK's update-staging component allows an unauthenticated actor on the hospital's internal network to inject a firmware payload into the staging queue without triggering the SDK's integrity check, which relies on a CRC-32 checksum rather than a cryptographic signature. The injected firmware modifies the drug-volume calculation routine by a factor of 1.12 for a specific drug class, producing systematic overdoses when the affected pumps are next programmed. The firmware propagates to 214 pumps before the discrepancy is identified through a clinical incident involving a patient receiving an unintended dose escalation. Forty-one patients receive incorrect doses before clinical staff correlate the anomaly with a recent firmware event; two patients require extended observation for adverse effects. The hospital faces regulatory investigation under medical device legislation, must withdraw all 680 pumps from service pending forensic analysis, and incurs direct costs exceeding $2.8 million in device replacement, clinical review, and regulatory response. The control failures are threefold: reliance on a non-cryptographic integrity mechanism, absence of firmware provenance attestation at the point of deployment, and absence of staged rollout with clinical outcome monitoring prior to fleet-wide propagation.

Example C — Municipal Autonomous Vehicle Fleet Hijacked via Rogue Base Station (Public Sector, 120 Shuttles)

A municipal transit authority operates 120 Level 4 autonomous electric shuttles on a fixed-route network serving 40,000 daily passengers. The shuttles receive firmware updates via a cellular OTA channel that uses TLS for transport but does not validate the firmware payload against a hardware-rooted signature stored in a secure enclave. A threat actor establishes a rogue cellular base station near a shuttle depot and performs a man-in-the-middle attack during a scheduled OTA session, substituting a legitimate perception-stack firmware update with a modified image that alters lane-boundary confidence thresholds, causing the perception system to treat pedestrian-occupied lane edges as clear. The rogue image is accepted because the OTA client verifies only the TLS session certificate (which is correctly presented through the attacker's transparent proxy) and not the firmware payload signature. Twelve shuttles download and partially install the update before the depot's anomaly-detection system flags an unusual cellular handoff pattern. The twelve affected shuttles are immediately placed in manual override. Post-incident analysis determines that had the update fully deployed and the shuttles entered service, the perception degradation would have created a high probability of pedestrian collision events across multiple routes. The authority suspends the entire fleet for 72 hours, affecting 120,000 passenger journeys and incurring $1.9 million in contingency transport costs. Regulatory authorities mandate a complete firmware trust architecture review before the fleet is permitted to re-enter autonomous operation. The failure is attributable to conflating transport-layer security with payload integrity verification, and to the absence of hardware-rooted trust anchors in the OTA client.

Section 4: Requirement Statement

4.0 Scope

This dimension applies to any AI system, autonomous agent, robotic platform, or IoT/edge device that (a) executes firmware as a distinct software layer controlling hardware behaviour, (b) receives firmware updates through any network-accessible channel whether scheduled or on-demand, and (c) operates in contexts where a firmware defect, corruption, or malicious modification could cause physical harm, safety-critical system failure, infrastructure disruption, or rights-relevant adverse outcomes affecting individuals or groups. Scope includes embedded microcontroller firmware, field-programmable gate array (FPGA) bitstreams, bootloader code, trusted execution environment (TEE) images, and any low-level software layer that executes prior to or independently of the primary operating system. Scope extends to the full firmware lifecycle: development, build, signing, distribution, staging, deployment, runtime attestation, and rollback. Organisations operating fleets of fewer than ten devices in non-safety-critical contexts MAY apply a simplified subset of these requirements as documented in Section 6, but MUST still satisfy requirements 4.1, 4.3, and 4.7 without exception.

4.1 Cryptographic Firmware Authentication

Every firmware image distributed to any device in scope MUST be cryptographically signed using an asymmetric signature scheme with a minimum security strength of 256 bits (e.g., ECDSA P-256 or stronger, Ed25519, or RSA-4096 minimum). The signing key MUST be held in a hardware security module (HSM) or equivalent hardware-isolated key storage that prevents extraction of the private key material. Devices MUST verify the firmware signature against a trust anchor stored in write-protected hardware (secure boot ROM, one-time programmable fuses, or a certified secure element) before executing any new firmware image or accepting it into a staged state. Verification MUST occur on the device itself and MUST NOT be delegatable to a remote verification service as the sole check. Signature verification failure MUST cause the device to reject the firmware image, log the rejection event with a tamper-evident timestamp, and retain the previously executing firmware version.

4.2 Certificate Chain of Trust and Root of Trust Management

Signing certificates MUST be issued within a certificate hierarchy rooted at an organisationally controlled root certificate authority (CA). The root CA private key MUST be stored offline in an HSM with access governed by a documented multi-person authorisation policy requiring a minimum of two authorised personnel for any signing operation. Intermediate CA certificates used for firmware signing MUST have defined validity periods not exceeding 24 months and MUST be subject to revocation through a mechanism (certificate revocation list or online certificate status protocol endpoint) that is accessible to devices during the update process. Revoked certificates MUST cause firmware signed by those certificates to be rejected by devices that have received revocation information. The full certificate chain from signing leaf to root MUST be embedded in or accompany every firmware package, and devices MUST validate the complete chain, not merely the leaf certificate.

4.3 Firmware Integrity Verification Beyond Transport Security

Firmware integrity MUST be verified through payload-level cryptographic mechanisms independently of any transport-layer security (TLS, DTLS, or equivalent) used to deliver the firmware package. Transport-layer encryption protects the channel but does not attest to the provenance or integrity of the payload; these are distinct security properties and MUST be enforced separately. Devices MUST compute and verify a cryptographic hash of the received firmware image against a signed hash value included in the firmware package manifest before installation. The hash algorithm MUST be SHA-256 minimum; SHA-3-256 or SHA-512 is preferred for new deployments.

4.4 Staged Rollout with Safety-Gated Canary Deployment

Fleet firmware updates MUST be deployed through a staged rollout process that prevents simultaneous deployment to more than a defined maximum proportion of the fleet in the initial rollout phase. For safety-critical deployments (those operating in environments with potential for physical harm), the initial canary cohort MUST NOT exceed five percent of the total fleet or twenty devices, whichever is smaller. Progression from the canary cohort to broader rollout phases MUST be gated by automated evaluation of defined safety and operational health metrics collected from canary devices over a monitoring period of not less than one full operational cycle (minimum four hours for continuously operating devices). If any canary device fails a health metric threshold during the monitoring period, the rollout MUST be automatically halted and the deployment system MUST require explicit human authorisation before any further deployment proceeds.

4.5 Atomic Rollback Capability

Every device MUST maintain at minimum one complete copy of the previously executing, verified firmware image in a protected storage partition that cannot be overwritten by the update process for the currently applying firmware. In the event of a failed update (verified by boot failure, integrity check failure, or watchdog timeout during first boot of the new firmware), the device MUST automatically revert to the known-good prior firmware image without requiring human intervention or network connectivity. The rollback process MUST itself verify the integrity of the prior firmware image before executing it. Devices MUST transmit a rollback event notification to the fleet management system as soon as network connectivity is restored following rollback execution.

4.6 Firmware Bill of Materials (FBOM) and Provenance Records

For every firmware image released to production, the responsible organisation MUST produce and retain a Firmware Bill of Materials (FBOM) that documents: (a) the precise software components, libraries, and dependencies included in the firmware image with their version identifiers and source locations; (b) the build environment specification including compiler version, build toolchain, and build flags; (c) the identity of the individual or automated system that triggered the build; (d) the identity of the individual(s) who authorised the signing of the firmware image; (e) the signing timestamp and the serial number of the certificate used; and (f) the SHA-256 (minimum) hash of the final signed firmware package. The FBOM MUST be stored in a tamper-evident log (append-only, cryptographically chained, or equivalent) and MUST be retained for the full operational lifetime of any device that receives the corresponding firmware version, plus a minimum of seven years thereafter.

4.7 Device Identity and Attestation Prior to Update Acceptance

Before delivering a firmware update to a device, the fleet management system MUST authenticate the device's identity through a device certificate or hardware attestation mechanism rooted in a hardware identity credential (device-unique private key stored in a secure element, TPM, or equivalent). The fleet management system MUST verify that the requesting device's identity is registered in the authorised device inventory, that the device's current firmware version and reported hardware configuration are consistent with those expected by the management system, and that the device is not flagged as compromised or under investigation. Firmware updates MUST NOT be delivered to devices that fail identity authentication. Unauthenticated or anomalous update requests MUST be logged and flagged for security review.

4.8 Secure Firmware Distribution Channel Requirements

Firmware packages MUST be distributed over encrypted channels using TLS 1.2 minimum (TLS 1.3 preferred) with certificate pinning or equivalent trust-anchored channel authentication implemented on the device. Distribution servers MUST implement access controls that restrict firmware upload and publication rights to authorised personnel and automated build systems with verified credentials. The firmware distribution infrastructure MUST be monitored for anomalous access patterns, including off-hours uploads, uploads from unexpected source addresses, and replacement of previously published firmware versions for already-released version numbers. Version replacement events MUST require multi-person authorisation and MUST generate an immutable audit log entry.

4.9 Emergency Firmware Response and Fleet Quarantine Capability

The fleet management system MUST provide a documented and regularly tested capability to (a) immediately halt all in-progress firmware deployments across the entire fleet or any defined subset, (b) quarantine devices running a specified firmware version by preventing them from entering operational states that could cause harm while preserving diagnostic telemetry, and (c) initiate an emergency rollback of a specified firmware version across the fleet within a defined maximum response time that MUST be documented and tested annually. The emergency response capability MUST be operable without dependency on the firmware distribution infrastructure (i.e., it MUST remain functional even if the primary distribution system is compromised or unavailable). Access to emergency fleet quarantine commands MUST be restricted to named authorised personnel and MUST be logged with identity, timestamp, and justification for every exercise of the capability.

Section 5: Rationale

Structural Versus Behavioural Enforcement

Firmware governs device behaviour at a level below the operating system, below application logic, and below any runtime safety monitor that depends on software. A compromise or defect at the firmware layer therefore subverts all higher-level controls simultaneously. This is categorically different from application-layer vulnerabilities: a malicious actor who controls a device's firmware controls its actuators, its sensor reporting, its communication stack, and its response to safety commands. For this reason, firmware trust cannot be enforced primarily through agent monitoring of device outputs; by the time anomalous behaviour is observable, the compromise is already in effect and may have already caused harm. Preventive structural controls — hardware-rooted signature verification, immutable rollback partitions, staged deployment gating — are therefore the primary defence layer, with agent monitoring serving as a secondary detection mechanism.

Why Fleet Scale Creates Unique Risk

A single vulnerable device is a point risk. A fleet of thousands of devices sharing a common firmware update channel and a common vulnerability surface is a systemic risk. The fleet architecture that enables efficient management — centralised update distribution, common firmware versions, automated deployment — is precisely the architecture that enables a single supply-chain compromise to propagate simultaneously across every device. This amplification dynamic means that the expected harm of a firmware trust failure scales with fleet size in a way that point-device risks do not. Governance must therefore treat the fleet distribution infrastructure itself as a critical asset requiring protection commensurate with the harm that its compromise would cause, and must implement staged deployment not merely for operational convenience but as a mandatory harm-limitation control.

Why Regulatory and Contractual Pressure Alone Is Insufficient

Many organisations operating device fleets treat firmware update security as an operational concern managed through vendor contracts and periodic audits. This approach is structurally inadequate because: (a) contractual obligations cannot enforce technical controls on devices already deployed in the field; (b) periodic audits cannot detect the window of compromise between audit cycles; and (c) vendor representations about firmware security practices cannot substitute for on-device verification that the firmware being executed is the firmware that the vendor claims to have produced. The requirements in Section 4 are designed to be technically enforceable on-device, not merely contractually asserted.

The Rollback Imperative

A firmware update that cannot be safely reversed is a commitment to the correctness of that update that no organisation can make with certainty. Even correctly signed firmware from an authorised source may contain defects that manifest only under specific operational conditions encountered after deployment. The rollback capability required by 4.5 is therefore not a contingency measure for security failures alone; it is a fundamental resilience requirement for any safety-critical system. The requirement for automatic rollback without network dependency is specifically designed to address the failure mode in which a faulty update degrades or destroys the device's ability to communicate, preventing a network-initiated recovery.

Section 6: Implementation Guidance

Hardware Root of Trust Architecture: Implement firmware verification using a hardware root of trust established during device manufacturing. Preferred approaches include secure boot implementations that chain from ROM-resident code through each boot stage, with each stage verifying the next using a key stored in write-protected hardware. One-time programmable (OTP) fuses or equivalent hardware mechanisms should be used to store the public key hash of the root signing key, preventing substitution of the trust anchor through software means. For devices with sufficient resources, a Trusted Platform Module (TPM) 2.0 or a certified secure element (meeting Common Criteria EAL 4+ or equivalent) provides the strongest available foundation.

Dual-Bank Firmware Storage: Implement A/B partition schemes in which the device maintains two complete firmware images — the currently running image in the active bank and the most recently verified prior image in the fallback bank. The update process writes to the inactive bank, verifies the written image, then performs an atomic bank-swap on the next boot cycle. If the new image fails to boot successfully within a defined watchdog timeout, the bootloader automatically reverts to the fallback bank. This pattern provides atomic rollback without the complexity of differential patching and is compatible with resource-constrained microcontroller environments when flash capacity permits.

Firmware Package Manifest Standard: Structure firmware packages as signed containers including: the firmware binary, a manifest file (JSON or CBOR format) containing the target device class, minimum compatible hardware version, minimum compatible current firmware version for upgrade, SHA-256 and SHA-512 hashes of the firmware binary, expiry timestamp after which the package must be re-signed before deployment, and the signing certificate chain. The container signature should cover the entire manifest-plus-binary structure, not merely the binary, to prevent manifest tampering.

Canary Telemetry Design: Design canary health metrics to be specific to the firmware change being deployed. A firmware update affecting the motor controller should gate on actuation accuracy metrics and fault rates, not generic uptime. Define pass/fail thresholds for each metric before the canary deployment begins, not after observing results, to prevent post-hoc rationalisation of anomalous data.

Key Rotation and Succession Planning: Document a key rotation schedule for firmware signing keys (recommended maximum 18 months for production signing keys) and a tested succession procedure for emergency key compromise scenarios. Devices should be provisioned with the ability to accept firmware signed by successor keys, with the succession authorisation itself signed by the current root key, to prevent lockout following key rotation.

Offline Emergency Response Infrastructure: Maintain a physically separate, air-gapped or network-isolated management console capable of issuing emergency quarantine commands and initiating rollback operations. This console should not share authentication infrastructure with the primary firmware distribution system to ensure it remains operable if the primary system is compromised.

6.2 Explicit Anti-Patterns

Do not use CRC, MD5, or SHA-1 for firmware integrity verification. These mechanisms do not provide collision resistance sufficient to prevent deliberate forgery. CRC and MD5 are trivially defeated by a competent attacker. SHA-1 is cryptographically deprecated. Any existing deployment using these mechanisms should be treated as non-conformant and scheduled for remediation.

Do not conflate transport security with payload integrity. TLS ensures that the firmware bytes received are the firmware bytes transmitted by the server in that session. It does not verify that the server was authorised to transmit those bytes, or that the firmware was produced by an authorised build process. These are distinct properties requiring distinct controls.

Do not permit version rollback without explicit authorisation. Automatically accepting a firmware version older than the device's current version (downgrade) can reintroduce patched vulnerabilities. Legitimate rollback (to the immediately prior known-good version) should be distinguished from arbitrary version downgrade. Devices should enforce a minimum version floor that can only be updated forward, preventing reinstallation of versions that have been explicitly revoked.

Do not store private signing keys in software-accessible memory. Signing keys stored in general-purpose file systems, environment variables, or application configuration files are vulnerable to extraction through any software-layer compromise. The signing infrastructure's security posture determines the entire fleet's trustworthiness; it must be commensurate with that responsibility.

Do not deploy firmware updates to the entire fleet without a staged rollout, regardless of urgency. Emergency security patches are frequently cited as justifications for bypassing canary deployment. This reasoning is backwards: a security patch applied incorrectly to the entire fleet simultaneously creates a larger operational crisis than the vulnerability it addresses. Emergency patches should use an accelerated but still-staged process with a compressed (e.g., 30-minute) canary window rather than no canary window.

Do not rely on vendor-reported firmware versions without on-device attestation. A device that reports its firmware version through software is reporting what its software believes or is configured to report, not necessarily what is executing. Hardware attestation mechanisms that can attest the hash of the executing image through a trusted execution path are the only reliable mechanism for verifying actual firmware state.

6.3 Industry-Specific Considerations

Medical Devices: Applicable regulatory frameworks (including IEC 62443, IEC 62304, and national medical device software regulations) impose additional pre-market validation requirements on firmware changes. Staged rollout plans for medical device firmware must account for clinical validation requirements; automated health metrics gating may need to be supplemented by clinical outcome monitoring periods. SBOM/FBOM requirements align with software transparency obligations emerging from medical device regulators globally.

Automotive and Mobility: UNECE WP.29 Regulation 156 (Software Update Management Systems) establishes mandatory requirements for OTA update processes in regulated vehicle types that overlap significantly with the requirements in this dimension. Implementations must ensure that firmware update processes satisfy the operational design domain constraints applicable to the vehicle type; firmware updates must not alter safety-critical parameters without corresponding validation evidence.

Critical Infrastructure and Public Sector: Devices operating in critical infrastructure environments (energy, water, transport) may be subject to sector-specific cybersecurity frameworks that impose supply-chain transparency requirements. FBOM records required by 4.6 should be designed to satisfy these requirements, and the retention period of seven years specified in 4.6 should be extended to match any sector-specific retention obligations that exceed this minimum.

6.4 Maturity Model

Maturity LevelCharacteristics
Level 1 — BasicFirmware packages are cryptographically signed; devices verify signatures before installation; manual rollback capability exists. Requirements 4.1, 4.3, 4.5 partially satisfied.
Level 2 — ManagedHardware root of trust implemented; certificate chain validation in place; staged rollout process exists with documented canary thresholds; FBOM records produced. Requirements 4.1–4.6 substantially satisfied.
Level 3 — ControlledFull chain-of-trust from secure element through bootloader to application; automated canary gating with safety-specific metrics; device identity attestation integrated into update authorisation; emergency quarantine capability tested annually. All requirements in Section 4 satisfied.
Level 4 — OptimisingContinuous firmware attestation during operation (not only at update time); automated FBOM vulnerability scanning against current CVE databases; predictive anomaly detection on fleet-wide telemetry to identify firmware-induced behavioural drift before safety events; formal verification of safety-critical firmware components. All requirements exceeded with additional proactive controls.

Section 7: Evidence Requirements

7.1 Continuous Technical Artefacts

ArtefactDescriptionRetention Period
Firmware Package ArchiveEvery signed firmware package released to production, including the complete manifest, binary, and signing certificate chainDevice operational lifetime + 7 years
Firmware Bill of Materials (FBOM)Per-release FBOM as specified in requirement 4.1Device operational lifetime + 7 years
Build Pipeline LogsTimestamped, tamper-evident logs of every firmware build, including build environment specification, triggering identity, and output hash7 years
Signing Event LogsRecords from the HSM or equivalent documenting every firmware signing operation, including timestamp, certificate serial number, operator identity, and hash of the signed payload7 years
Certificate Authority RecordsRoot CA and intermediate CA certificate records, issuance logs, and revocation recordsValidity period of issued certificates + 10 years
Key Custodian RecordsRecords of multi-person authorisation events for root CA operations, including identities of all custodians present10 years

7.2 Deployment and Operations Artefacts

ArtefactDescriptionRetention Period
Rollout PlansPer-release staged rollout plans including canary cohort definition, health metric thresholds, and progression criteria5 years
Canary Monitoring ReportsRecords of health metrics collected during canary phases and the gating decision (proceed/halt) for each phase transition5 years
Deployment Audit LogsTamper-evident logs of every firmware update delivered to every device, including device identity, timestamp, firmware version, and delivery outcomeDevice operational lifetime + 7 years
Rollback Event RecordsRecords of every automatic or manual rollback event, including triggering condition, device identity, prior and reverted firmware versions, and notification to fleet management system5 years
Device Identity RegistryCurrent and historical records of all registered devices, their hardware identity credentials, and their authorised firmware version historyDevice operational lifetime + 7 years

7.3 Governance and Testing Artefacts

ArtefactDescriptionRetention Period
Emergency Response ProcedureDocumented procedures for fleet quarantine, rollback initiation, and emergency response, including named authorised personnelCurrent version + all prior versions for 5 years
Emergency Response Test RecordsRecords of annual emergency response capability tests including scenario description, participants, outcomes, and identified gaps5 years
Conformance Assessment RecordsRecords of internal or third-party assessments against this dimension, including test results and remediation actions5 years
Vendor and Contractor AttestationsWritten attestations from third-party firmware developers or supply chain participants regarding their compliance with the signing and provenance requirements imposed on themContract duration + 7 years

Section 8: Test Specification

Test 8.1 — Cryptographic Signature Enforcement (Maps to Requirement 4.1)

Objective: Verify that devices reject firmware images that are unsigned, carry an invalid signature, or carry a signature from a key not present in the device's trust anchor store.

Method:

  1. Prepare three test firmware images: (a) an unsigned image, (b) a validly signed image with a signature corrupted by a single-byte flip in the signature value, and (c) an image signed by a self-generated key not registered in the device's trust anchor.
  2. Deliver each test image to a representative sample of at least five devices per device class in the fleet through the standard OTA channel.
  3. Observe and record device response to each image.
  4. Verify that the standard deployment channel is then used to deliver a legitimately signed current firmware image to confirm the device remains operational after rejection events.

Expected Outcome: All three test images are rejected by all test devices without installation. Each rejection generates a tamper-evident log entry. Legitimate firmware installs successfully after rejection events.

Conformance Scoring:

ScoreCriterion
3All three image variants rejected by 100% of test devices; log entries generated for all rejections; legitimate firmware accepted without issue
2All three image variants rejected by ≥90% of test devices with minor logging gaps
1At least one image variant rejected by all test devices; partial logging
0Any image variant accepted by any test device, OR rejection prevents subsequent legitimate update acceptance

Test 8.2 — Certificate Chain Validation and Revocation Enforcement (Maps to Requirement 4.2)

Objective: Verify that devices validate the complete certificate chain and reject firmware signed by revoked certificates.

Method:

  1. Obtain or generate a firmware image signed by an intermediate CA certificate that has been deliberately added to the organisation's certificate revocation list (CRL) or OCSP endpoint.
  2. Ensure test devices have received updated revocation information (either through a recent CRL distribution point check or OCSP query).
  3. Deliver the revoked-certificate-signed firmware to at least five representative devices.
  4. Separately, deliver a firmware image that contains only the leaf signing certificate (not the full chain) to verify chain completeness validation.

Expected Outcome: Firmware signed by the revoked certificate is rejected by all test devices. Firmware presented without a complete chain is rejected by all test devices. Both rejection types generate distinct log entries identifying the specific validation failure.

Conformance Scoring:

ScoreCriterion
3Both test cases rejected by 100% of devices with distinct logged failure reasons
2Both test cases rejected; logging incomplete or failure reasons not distinguished
1One of two test cases rejected consistently
0Any revoked-certificate firmware accepted by any device

Test 8.3 — Staged Rollout Canary Gating (Maps to Requirement 4.4)

Objective: Verify that the rollout system enforces canary cohort size limits and halts deployment automatically when health metric thresholds are breached.

Method:

  1. Configure a test firmware release targeting a representative subset of the fleet (minimum 100 devices for meaningful testing).
  2. Verify that the initial deployment targets no more than five percent of the target population (or twenty devices, whichever is smaller).
  3. Simulate a health metric breach on canary devices by injecting a test signal or using a test firmware version engineered to report above-threshold fault rates.
  4. Verify that the rollout system halts deployment automatically without human intervention.
  5. Verify that progression after halt requires explicit human authorisation (attempt to resume without authorisation to confirm blocking).

Expected Outcome: Initial cohort within size limits; automatic halt occurs within the monitoring system's configured polling interval (not to exceed fifteen minutes); unauthorised resumption is blocked and generates an alert.

Conformance Scoring:

ScoreCriterion
3Cohort size within limits; automatic halt confirmed; unauthorised resumption blocked
2Cohort size within limits; automatic halt confirmed; resumption control gap identified but does not permit deployment
1Automatic halt confirmed but cohort size limit exceeded in initial deployment
0Automatic halt does not trigger, or deployment proceeds to full fleet without gating

Test 8.4 — Automatic Rollback on Boot Failure (Maps to Requirement 4.5)

Objective: Verify that devices automatically revert to the prior verified firmware image when a new firmware image fails to boot successfully.

Method:

  1. Using a controlled test environment (not production devices), deploy a test firmware image engineered to fail on first boot (e.g., immediately triggering a watchdog reset without completing the boot sequence).
  2. Allow the device to attempt to boot the new firmware through the maximum number of retry attempts defined in the bootloader configuration.
  3. Observe and record the device's state after retry exhaustion.
  4. Verify that the device boots the prior firmware version and reports its current version.
  5. Verify that a rollback event notification is transmitted to the fleet management system.
  6. Verify that the reverted prior firmware image passes integrity verification (device reports successful self-check or test independently verifies hash).

Expected Outcome: Device reverts to prior firmware without human intervention; prior firmware version is correctly reported; rollback notification is received by the fleet management system; prior firmware passes integrity self-check.

Conformance Scoring:

ScoreCriterion
3Automatic reversion confirmed; prior firmware version correctly reported; fleet management system notification received; integrity check passed
2Automatic reversion confirmed; notification gap or integrity check not independently verifiable
1Reversion possible but requires manual intervention
0Device fails to revert to prior firmware and requires physical intervention or remains non-operational

Test 8.5 — Firmware Bill of Materials Completeness and Tamper Evidence (Maps to Requirement 4.6)

Objective: Verify that FBOMs are produced for all production releases, contain all required fields, and are stored in a tamper-evident manner.

Method:

  1. Select a random sample of five firmware releases from the past 24 months (or all releases if fewer than five exist).
  2. Retrieve the FBOM for each selected release.

3.

Section 9: Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 9 (Risk Management System)Direct requirement
NIST AI RMFGOVERN 1.1, MAP 3.2, MANAGE 2.2Supports compliance
ISO 42001Clause 6.1 (Actions to Address Risks), Clause 8.2 (AI Risk Assessment)Supports compliance

EU AI Act — Article 9 (Risk Management System)

Article 9 requires providers of high-risk AI systems to establish and maintain a risk management system that identifies, analyses, estimates, and evaluates risks. Fleet Firmware Trust Governance implements a specific risk mitigation measure within this framework. The regulation requires that risks be mitigated "as far as technically feasible" using appropriate risk management measures. For deployments classified as high-risk under Annex III, compliance with AG-596 supports the Article 9 obligation by providing structural governance controls rather than relying solely on the agent's own reasoning or behavioural compliance.

NIST AI RMF — GOVERN 1.1, MAP 3.2, MANAGE 2.2

GOVERN 1.1 addresses legal and regulatory requirements; MAP 3.2 addresses risk context mapping; MANAGE 2.2 addresses risk mitigation through enforceable controls. AG-596 supports compliance by establishing structural governance boundaries that implement the framework's approach to AI risk management.

ISO 42001 — Clause 6.1, Clause 8.2

Clause 6.1 requires organisations to determine actions to address risks and opportunities within the AI management system. Clause 8.2 requires AI risk assessment. Fleet Firmware Trust Governance implements a risk treatment control within the AI management system, directly satisfying the requirement for structured risk mitigation.

Section 10: Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide — potentially cross-organisation where agents interact with external counterparties or shared infrastructure
Escalation PathImmediate executive notification and regulatory disclosure assessment

Consequence chain: Without fleet firmware trust governance, the governance framework has a structural gap that can be exploited at machine speed. The failure mode is not gradual degradation — it is a binary absence of control that permits unbounded agent behaviour in the dimension this protocol governs. The immediate consequence is uncontrolled agent action within the scope of AG-596, potentially cascading to dependent dimensions and downstream systems. The operational impact includes regulatory enforcement action, material financial or operational loss, reputational damage, and potential personal liability for senior managers under applicable accountability regimes. Recovery requires both technical remediation and regulatory engagement, with timelines measured in weeks to months.

Cite this protocol
AgentGoverning. (2026). AG-596: Fleet Firmware Trust Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-596