AG-416

Evidentiary Chain-of-Custody Governance

Logging, Observability & Forensics ~25 min read AGS v2.1 · April 2026
EU AI Act SOX FCA NIST ISO 42001

2. Summary

Evidentiary Chain-of-Custody Governance requires that all governance-relevant evidence generated by or about AI agent operations — including audit trail records, decision journal entries, configuration snapshots, telemetry data, model input/output pairs, and multimedia evidence — is subject to a documented, tamper-evident chain of custody from the moment of creation through storage, access, transfer, and eventual disposition. Chain of custody establishes who created the evidence, who has accessed or modified it, under what authority, at what time, and with what protections against alteration. Without chain of custody, evidence that is technically complete and well-structured may be inadmissible in regulatory proceedings, unpersuasive in litigation, and unreliable for internal investigation — because the absence of custody documentation creates reasonable doubt about whether the evidence reflects what actually occurred or has been altered after the fact.

3. Example

Scenario A — Contested Audit Trail in Regulatory Enforcement: A financial-value agent executes 2,340 customer transactions over a 6-month period. A regulatory investigation into 47 of those transactions requests the audit trail records. The organisation produces the records within 48 hours, and the records appear complete — timestamps, decision references, input/output pairs, and mandate authority citations are all present. However, the regulator's forensic examiner asks: "Who has accessed these records since they were created? Were they stored in a system with write access by the operations team? Is there a log of every access to these records?" The organisation cannot answer. The audit trail records were stored in a general-purpose database accessible to 14 system administrators. No access log exists for the evidence store. No integrity verification was performed between creation and production. The regulator applies an adverse inference: the evidence may have been altered, and 23 of the 47 transactions cannot be satisfactorily resolved. The resulting enforcement action cites "inadequate evidentiary controls" and imposes a £2.8 million fine — not for the underlying transactions, but for the inability to produce trustworthy evidence.

What went wrong: The evidence itself was technically complete, but the absence of chain-of-custody documentation — who accessed the records, whether they were stored in a tamper-evident system, and whether integrity was verified — rendered the evidence unreliable in the regulator's assessment. The £2.8 million fine was imposed for evidentiary failure, not operational failure. Consequence: £2.8 million regulatory fine, mandatory remediation programme, 12-month enhanced supervisory scrutiny, and inability to defend against substantive transaction claims.

Scenario B — Evidence Contamination During Internal Investigation: An enterprise workflow agent is suspected of making procurement decisions that systematically favour a particular vendor category. The internal investigation team retrieves the agent's decision journal entries (per AG-415) for the past 12 months. During the investigation, an analyst exports the journal entries to a spreadsheet for analysis, modifies column headers for readability, sorts records by vendor category, and saves the modified spreadsheet as the "investigation evidence file." A second analyst opens the spreadsheet, notices formatting errors, corrects what appear to be data entry mistakes in three records, and saves again. When the investigation concludes with a finding of bias, the vendor's legal counsel challenges the evidence: "The evidence file was modified by two individuals after extraction. Three records were altered. There is no record of what the original data contained versus what was changed. This evidence is contaminated." The organisation must restart the investigation using original records — but by this time, the original database has undergone a scheduled data migration, and the pre-migration records were not preserved with integrity verification.

What went wrong: Evidence was extracted from its original custody without maintaining an integrity chain. Modifications by analysts were not logged, not justified, and not reversible. The working copy became the only accessible copy after the data migration. No chain-of-custody protocol prevented or tracked the contamination. Consequence: 7-month investigation restart, £420,000 in additional investigation and legal costs, inability to sustain the original finding, and reputational damage from a withdrawn investigation conclusion.

Scenario C — Cross-Jurisdictional Evidence Transfer Failure: A crypto/web3 agent operating across EU and US jurisdictions generates evidence relevant to a multi-jurisdictional enforcement action. US regulators request evidence held in EU data centres. The organisation transfers the evidence via encrypted file transfer. Upon receipt, US regulators note that the evidence files have different hash values from those recorded at creation — the encryption, transfer, and decryption process altered metadata timestamps embedded in the file headers. The EU evidence custodian did not record the pre-transfer hashes, the transfer method, or the decryption verification. The US regulators cannot verify that the evidence they received matches what was originally generated. The evidence is classified as "unverified" and carries diminished weight in the enforcement proceeding. The case that would have resulted in a negotiated £1.6 million settlement instead proceeds to a contested hearing at an estimated cost of £3.2 million.

What went wrong: Cross-jurisdictional evidence transfer lacked chain-of-custody documentation. Pre-transfer integrity verification was not performed. The transfer method altered file metadata without recording the expected change. Post-transfer integrity verification was not performed against original creation hashes. Consequence: Evidence classified as unverified, £1.6 million settlement opportunity lost, £3.2 million contested hearing costs, and precedent-setting weakness in the organisation's evidentiary infrastructure.

4. Requirement Statement

Scope: This dimension applies to all governance-relevant evidence generated by, about, or through AI agent operations. "Evidence" in this context encompasses any artefact that may be required to demonstrate compliance, support investigation, defend against claims, or satisfy regulatory requests. This includes but is not limited to: audit trail records (AG-023), decision journal entries (AG-415), configuration snapshots (AG-007), model input/output pairs, telemetry and trace data (AG-410), video and screen evidence (AG-411), tamper-evident integrity records (AG-006), performance metrics, error logs, and any derivative artefacts created from primary evidence (reports, summaries, extracts). The scope covers the full evidence lifecycle: creation, initial storage, ongoing storage, access (read and write), transfer (internal and external), transformation (format conversion, aggregation, anonymisation), archival, and disposition (deletion or destruction). The scope extends to evidence held by third parties on the organisation's behalf — cloud storage providers, managed service providers, and audit firms. The test for whether an artefact is in scope is: "Could this artefact be requested by a regulator, cited in litigation, or needed for internal investigation?" If yes, it requires chain-of-custody governance.

4.1. A conforming system MUST maintain a custody log for every governance-relevant evidence artefact, recording at minimum: (a) creation timestamp and creating entity, (b) storage location and protection mechanisms, (c) every access event (read, write, copy, export) with accessor identity, timestamp, and purpose, (d) every transfer event with source, destination, transfer method, and pre/post-transfer integrity verification, and (e) disposition event (archival or destruction) with authoriser identity, timestamp, and method.

4.2. A conforming system MUST implement tamper-evident protection for all custody logs, ensuring that any modification to a custody log entry is detectable. Custody logs MUST NOT be stored in a system where the entities whose access they record have write access to the log itself.

4.3. A conforming system MUST verify the integrity of evidence artefacts at every custody transition — creation to storage, storage to access, storage to transfer, transfer to recipient, and storage to archival — using cryptographic hashes or equivalent integrity verification mechanisms aligned with AG-006.

4.4. A conforming system MUST implement role-based access controls for evidence stores, restricting write access to authorised evidence custodians and read access to authorised investigators, auditors, and compliance personnel. Access grants and revocations MUST be logged in the custody log.

4.5. A conforming system MUST ensure that evidence artefacts cannot be modified in place. Any necessary modification (correction, redaction, annotation) MUST create a new version while preserving the original, with both versions linked in the custody log and the modification reason documented.

4.6. A conforming system MUST implement evidence preservation holds (litigation holds or regulatory holds) that prevent the destruction, modification, or transfer of specified evidence artefacts when triggered by a legal, regulatory, or investigative event, overriding any automated retention or disposition schedules.

4.7. A conforming system MUST verify the integrity of evidence artefacts during cross-jurisdictional or cross-organisational transfer by recording pre-transfer hashes, documenting the transfer method, and verifying post-transfer hashes against pre-transfer values. Any hash discrepancy MUST be investigated and documented before the transferred evidence is relied upon.

4.8. A conforming system SHOULD implement automated custody log generation for routine evidence operations (storage writes, scheduled integrity checks, automated archival), reducing reliance on manual custody documentation.

4.9. A conforming system SHOULD implement evidence classification that assigns custody requirements proportional to the evidence's sensitivity and regulatory significance — high-sensitivity evidence (financial transaction records, safety-critical decision logs) receives stricter custody controls than low-sensitivity evidence (routine operational metrics).

4.10. A conforming system SHOULD maintain a catalogue of all evidence artefacts, their current custody status, storage locations, applicable retention periods, and any active preservation holds, accessible to authorised governance personnel.

4.11. A conforming system MAY implement cryptographic timestamping through an independent trusted timestamp authority to provide third-party verification of evidence creation times, strengthening the evidentiary weight of custody records.

4.12. A conforming system MAY implement automated evidence integrity monitoring that periodically verifies the integrity of stored evidence artefacts against their recorded hashes and alerts on any detected discrepancy.

5. Rationale

Evidence without chain of custody is assertion without proof. An audit trail that cannot demonstrate its own integrity is an unverified claim about what happened. A decision journal that has been accessible to the operations team under investigation is a document of unknown reliability. A configuration snapshot that was transferred across jurisdictions without integrity verification is a file of uncertain provenance. In each case, the underlying evidence may be perfectly accurate and complete — but without custody documentation, there is no way to know, and no way to persuade an external party (regulator, court, auditor) that the evidence is trustworthy.

Chain of custody is a foundational concept in legal and forensic practice. Physical evidence in criminal proceedings must demonstrate an unbroken chain from collection to courtroom — every person who handled the evidence, every location where it was stored, every transfer between parties, and every protection against contamination must be documented. Digital evidence follows the same principle, with additional complexity: digital artefacts can be copied without detection, modified without trace (absent integrity controls), and transferred across jurisdictions in ways that alter metadata. The absence of chain-of-custody governance for digital evidence is not a theoretical risk — it is a routine basis for evidence challenges in regulatory proceedings, litigation, and arbitration.

For AI agent governance specifically, chain of custody addresses three critical risks. First, the regulator credibility risk: when regulators request evidence of agent behaviour, the organisation must produce evidence that the regulator can trust. Regulators routinely assess the trustworthiness of evidence before assessing its content. Evidence stored in systems with uncontrolled write access, evidence transferred without integrity verification, and evidence with no access logs will be treated with scepticism regardless of its actual accuracy. Second, the litigation defence risk: when an agent's decision is challenged in litigation (by a customer, counterparty, or affected individual), the organisation's primary defence depends on evidence of what the agent did and why. If the opposing party can demonstrate that the evidence chain is broken — anyone with database access could have modified the records — the defence collapses. Third, the internal investigation integrity risk: when the organisation investigates its own agent's behaviour, the investigation must be conducted with evidence of known integrity. If investigators work with evidence that has been extracted, modified, and re-saved (Scenario B), the investigation conclusions are unreliable and may need to be withdrawn.

The relationship between AG-416 and AG-006 (Tamper-Evident Record Integrity) is complementary but distinct. AG-006 ensures that individual records are tamper-evident — modifications to a record are detectable. AG-416 ensures that the handling of those records is documented — who accessed them, when, why, and what protections were in place. An individual record can be tamper-evident (AG-006 compliant) while the evidence store it resides in has uncontrolled access (AG-416 non-compliant). Both are necessary: AG-006 protects the record; AG-416 protects the evidentiary environment.

The financial consequences of chain-of-custody failures are disproportionate to the cost of prevention. Scenario A's £2.8 million fine was imposed not for operational misconduct but for evidentiary inadequacy. Scenario B's £420,000 investigation restart cost arose entirely from evidence contamination that a basic chain-of-custody protocol would have prevented. Scenario C's £1.6 million lost settlement opportunity resulted from a transfer process that lacked integrity verification. In each case, the underlying evidence existed and was probably accurate — the failure was in demonstrating that accuracy to external parties. The cost of chain-of-custody governance (structured access controls, integrity verification, custody logging) is a small fraction of the cost of evidentiary failures.

6. Implementation Guidance

Evidentiary Chain-of-Custody Governance establishes a structured custody regime for all governance-relevant evidence artefacts. The core principle is that evidence must be self-proving — the evidence itself, combined with its custody log, must demonstrate its own integrity and provenance without reliance on external assurances or trust assumptions.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Financial Services. Financial regulators (FCA, SEC, BaFin, MAS) routinely assess the integrity of evidence presented in enforcement proceedings. FCA enforcement investigations specifically examine evidence custody procedures, and the FCA's investigation guidelines note that evidence of uncertain provenance receives diminished weight. Firms must implement financial-grade evidence custody aligned with existing regulatory expectations for trading records, communication records, and transaction documentation. Chain-of-custody procedures for agent evidence should be at least as rigorous as procedures for existing regulated records.

Crypto and Web3. Blockchain-native environments offer inherent chain-of-custody advantages through on-chain transaction records, but off-chain evidence (agent decision logs, configuration states, model inputs/outputs) still requires traditional custody governance. The intersection of on-chain and off-chain evidence creates a hybrid custody challenge: on-chain records are self-proving, but the off-chain context that explains those records (why the agent initiated a transaction, what alternatives were considered) requires AG-416 custody governance. Firms should implement custody bridges that link on-chain transaction hashes to off-chain evidence artefacts.

Safety-Critical and Cyber-Physical Systems. Accident investigation in safety-critical domains (aviation, automotive, industrial automation) follows established evidence custody protocols from physical-world investigation frameworks. Agent evidence must be integrated into these existing frameworks — the "black box" equivalent for AI agents must be subject to the same custody rigour as flight data recorders or vehicle event data recorders. Evidence from embodied agents operating in physical environments may include sensor data, video feeds, and actuator commands that have specific custody requirements under safety investigation regulations.

Public Sector and Rights-Sensitive. Government agencies using AI agents for decisions affecting individual rights face heightened evidence custody requirements under administrative law. Individuals challenging government decisions have the right to see the evidence on which the decision was based. If the evidence cannot demonstrate its own integrity through chain of custody, the government agency's decision may be overturned on procedural grounds regardless of its substantive merits. Freedom of information and subject access requests create additional custody obligations — evidence must be producible on demand with custody documentation.

Maturity Model

Basic Implementation — The organisation has implemented a dedicated evidence store with write-once semantics for primary evidence artefacts. Access to the evidence store is controlled through role-based access with segregation between creators, custodians, and consumers. A custody log records creation events, access events, and transfer events. Integrity hashes are computed at creation and verified on access. Preservation holds can be activated manually. This level meets the mandatory MUST requirements.

Intermediate Implementation — All basic capabilities plus: custody logging is fully automated at the infrastructure layer with no manual documentation dependencies. Integrity verification occurs at every custody transition with results logged. Evidence packaging for external transfer includes self-contained custody documentation and integrity verification materials. Evidence classification assigns custody requirements proportional to sensitivity. An evidence catalogue provides visibility into all evidence artefacts, their custody status, and applicable holds. Periodic integrity verification runs at least monthly.

Advanced Implementation — All intermediate capabilities plus: cryptographic timestamping through an independent trusted timestamp authority provides third-party verification of evidence creation times. Cross-jurisdictional transfer procedures include pre-transfer and post-transfer integrity verification with documented transfer methods. Automated evidence integrity monitoring continuously verifies stored evidence against recorded hashes. Independent audit has verified the chain-of-custody infrastructure. The organisation can demonstrate an unbroken integrity chain for any evidence artefact from creation to current state.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Custody Log Completeness at Creation

Test 8.2: Access Event Logging Enforcement

Test 8.3: Integrity Verification at Custody Transition

Test 8.4: Immutability of Evidence Artefacts

Test 8.5: Preservation Hold Enforcement

Test 8.6: Cross-Jurisdictional Transfer Integrity

Test 8.7: Custody Log Tamper Evidence

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 12 (Record-keeping)Direct requirement
EU AI ActArticle 16 (Obligations of Providers)Supports compliance
SOXSection 802 (Criminal Penalties for Altering Documents)Direct requirement
SOXSection 404 (Internal Controls Over Financial Reporting)Supports compliance
FCA SYSC9.1.1R (Record-keeping)Direct requirement
NIST AI RMFGOVERN 1.5, MANAGE 4.2Supports compliance
ISO 42001Clause 7.5 (Documented Information)Direct requirement
DORAArticle 11 (Backup Policies and Procedures, Restoration and Recovery)Supports compliance
DORAArticle 17 (ICT-related Incident Management)Supports compliance

EU AI Act — Article 12 (Record-keeping)

Article 12 requires that high-risk AI systems generate logs that enable monitoring and post-market surveillance. The provision implicitly requires that these logs are reliable — logs that cannot demonstrate their own integrity through chain of custody are inadequate for the monitoring and surveillance purposes that Article 12 envisions. AG-416 provides the custody governance that ensures Article 12 logs meet the implicit reliability requirement. Without chain of custody, an organisation may generate logs per Article 12 but be unable to demonstrate to a national competent authority that those logs are trustworthy.

SOX — Section 802 (Criminal Penalties for Altering Documents)

Section 802 makes it a federal crime to knowingly alter, destroy, mutilate, conceal, or falsify records with the intent to obstruct an investigation. For organisations subject to SOX, chain-of-custody governance is not optional — it is the mechanism that prevents accidental or negligent alteration of records that could be construed as obstruction. AG-416's requirements for immutable evidence storage, custody logging, and integrity verification directly support SOX Section 802 compliance by creating an infrastructure where evidence alteration is either impossible (WORM storage) or detectable (tamper-evident custody logs). The custody log itself serves as evidence that the organisation took reasonable steps to protect records from alteration.

FCA SYSC — 9.1.1R (Record-keeping)

The FCA requires firms to maintain records sufficient to enable the FCA to monitor compliance. The FCA's approach to evidence in enforcement proceedings includes assessment of evidence provenance — the FCA expects that records produced in response to information requests are authentic, unmodified, and produced from systems with appropriate integrity controls. AG-416 provides the custody infrastructure that satisfies this expectation. Firms that cannot demonstrate chain of custody for agent-generated evidence face an adverse inference in enforcement proceedings: the regulator may presume that the evidence does not accurately reflect what occurred.

ISO 42001 — Clause 7.5 (Documented Information)

Clause 7.5 requires that documented information needed by the AI management system is controlled, including ensuring its availability, suitability, and adequate protection. Chain-of-custody governance is the mechanism for "adequate protection" of documented information — ensuring that evidence artefacts are protected against unauthorised modification, that access is controlled, and that the integrity of documented information can be verified. Without custody governance, the "adequate protection" requirement of Clause 7.5 is not satisfied.

NIST AI RMF — GOVERN 1.5 and MANAGE 4.2

GOVERN 1.5 addresses mechanisms for documenting AI risk management processes and decisions. MANAGE 4.2 addresses mechanisms for continuously monitoring, evaluating, and updating deployed AI systems. Both functions depend on the availability of trustworthy evidence about system behaviour. AG-416 ensures that the evidence supporting these functions maintains its integrity and provenance throughout its lifecycle, enabling reliable risk management documentation and continuous monitoring.

DORA — Articles 11 and 17

DORA Article 11 requires backup policies and recovery procedures that ensure the availability and integrity of ICT system data. Article 17 requires ICT-related incident management including evidence preservation for incident investigation. AG-416 provides the custody framework that ensures backup and recovery procedures preserve evidence integrity (Article 11) and that incident investigation evidence is trustworthy and admissible (Article 17). The preservation hold capability directly supports Article 17's incident evidence requirements.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide — undermines the trustworthiness of all governance evidence across all agents, potentially rendering the entire governance programme undemonstrable

Consequence chain: Chain-of-custody failure creates a cascading credibility crisis across the entire governance programme. The immediate technical failure is evidence of uncertain provenance — artefacts that exist but cannot be proven authentic. The first-order consequence is evidentiary challenge: when any governance evidence is questioned (by a regulator, auditor, court, or internal investigation), the organisation cannot demonstrate that the evidence is trustworthy. This triggers an adverse inference — the examining party presumes the evidence may have been altered, which shifts the burden of proof to the organisation. The second-order consequence is governance programme invalidation: if the evidence supporting governance compliance is unreliable, then governance compliance itself is undemonstrable. An organisation with technically complete audit trails, decision journals, and configuration records — but without chain of custody — is in the same evidentiary position as an organisation that never created those records, because it cannot prove that the records are authentic. The third-order consequence is regulatory and legal exposure: regulatory enforcement actions that would have been resolved with trustworthy evidence instead escalate to contested proceedings (Scenario C's £1.6 million settlement becoming a £3.2 million hearing). Litigation defences that depend on agent behaviour evidence collapse when the evidence is challenged (Scenario B's investigation restart at £420,000). Regulatory findings cite evidentiary inadequacy as an independent violation, compounding the original substantive finding (Scenario A's £2.8 million fine for evidentiary failure). The ultimate organisational consequence is a loss of institutional credibility — the regulator, the court, or the auditor concludes that the organisation's governance evidence cannot be relied upon, creating a presumption of unreliability that affects all future interactions.

Cross-references: AG-006 (Tamper-Evident Record Integrity) provides the record-level integrity mechanisms that AG-416 extends to the full evidence lifecycle. AG-412 (Time Synchronisation Validation Governance) ensures the timestamps in custody logs are accurate and comparable across systems. AG-409 (Critical Event Taxonomy Governance) classifies events whose evidence requires chain-of-custody governance. AG-410 (High-Cardinality Trace Retention Governance) governs the retention of trace data that is subject to AG-416 custody requirements. AG-411 (Video and Screen Evidence Governance) addresses custody requirements specific to multimedia evidence artefacts. AG-413 (Observer-of-Observer Integrity Governance) ensures that the monitoring systems generating evidence are themselves trustworthy. AG-415 (Decision Journal Completeness Governance) generates decision journal artefacts that are subject to AG-416 custody. AG-023 (Audit Trail Governance) generates audit trail records that are subject to AG-416 custody.

Cite this protocol
AgentGoverning. (2026). AG-416: Evidentiary Chain-of-Custody Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-416