<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-hillier-certisyn-ai-governance-verified-00" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="AI Governance Verified">AI Governance Verified — A Cryptographic Verification Standard for Agentic AI Governance in Regulated Industries</title>
    <seriesInfo name="Internet-Draft" value="draft-hillier-certisyn-ai-governance-verified-00"/>
    <author initials="J. D." surname="Hillier" fullname="Joel David Hillier">
      <organization>Certisyn, Inc.</organization>
      <address>
        <email>jhillier@certisyn.com</email>
        <uri>https://certisyn.com/</uri>
      </address>
    </author>
    <date year="2026" month="May" day="13"/>
    <abstract>
      <?line 54?>

<t>This document specifies a verification standard for the cryptographic attestation of agentic AI governance in regulated industries. It defines the Verification Reconciliation Object (VRO), the issuing-partner framework, the eight control areas through which AI governance posture is reconciled, three maturity-attestation levels (Documented, Operational, Adversarial-ready), and the cryptographic continuity requirements that together produce deterministic, independently reconstructable, auditor-grade attestations of agentic AI governance. The standard sits beneath ISO/IEC 42001:2023, the NIST AI Risk Management Framework, and other agentic AI governance frameworks, and produces the verifiable artefact those frameworks were designed to imply but do not deliver.</t>
    </abstract>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Agentic artificial intelligence is now operative across the workplace at a scale that exceeds the control envelope of every previously published governance framework. ISO/IEC 42001:2023 <xref target="ISO42001"/> specifies a management system for AI but does not produce a verifiable artefact. The NIST AI Risk Management Framework <xref target="NIST-AI-RMF"/> provides a functional taxonomy but issues no certification or attestation. The European Union AI Act <xref target="EU-AI-ACT"/> establishes obligations and prohibitions but leaves verification of compliance to national competent authorities and self-attestation. No published standard issues a cryptographically anchored, deterministically reproducible monthly artefact of agentic AI governance.</t>
      <t>This document closes that gap. It defines the verification artefact, the issuing-partner framework, the evidence requirements across eight control areas, the maturity-level attestation methodology, and the cryptographic continuity requirements that together produce a deterministic, auditor-grade AI governance attestation.</t>
      <t>This document does not replace ISO/IEC 42001, the NIST AI Risk Management Framework, the EU AI Act, or any national framework. It sits beneath them and produces the artefact each was designed to imply but does not deliver. Where this document and any normative framework cited herein conflict on operational content, the cited framework prevails.</t>
      <t>This document applies to organisations that operate, integrate, deploy, or expose AI systems — whether developed internally, procured from third-party model providers, or consumed via API. It does not specify AI model architecture, training procedure, or evaluation methodology. It specifies the verification of governance applied to AI use, not the AI itself.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>For the purposes of this document, the following definitions apply.</t>
      <dl>
        <dt>Subject Entity:</dt>
        <dd>
          <t>The organisation whose AI governance posture is the subject of verification.</t>
        </dd>
        <dt>AI System:</dt>
        <dd>
          <t>Any deployed system, application, or service whose behaviour incorporates the use of one or more machine-learning models, irrespective of model architecture or training methodology.</t>
        </dd>
        <dt>Agentic System:</dt>
        <dd>
          <t>An AI System that takes actions in the operating environment, generates outputs that influence downstream decisions, or operates with reduced or absent human-in-the-loop supervision.</t>
        </dd>
        <dt>Model Provider:</dt>
        <dd>
          <t>An external party supplying a foundation model, fine-tuned model, or model-as-a-service to the Subject Entity.</t>
        </dd>
        <dt>Deployment Context:</dt>
        <dd>
          <t>The set of integrations, data sources, user populations, regulatory obligations, and risk attributes within which an AI System is operated.</t>
        </dd>
        <dt>Governance Surface:</dt>
        <dd>
          <t>The composite of policies, controls, telemetry, evidence sources, and review cadences through which the Subject Entity governs the use of its AI Systems.</t>
        </dd>
        <dt>Verification Reconciliation Object (VRO):</dt>
        <dd>
          <t>The deterministic, cryptographically anchored output of a conforming AI governance attestation under this standard.</t>
        </dd>
        <dt>Issuing Partner:</dt>
        <dd>
          <t>A counterparty designated by the protocol operator to act as a co-issuer of VROs under this standard within a defined market or scope.</t>
        </dd>
        <dt>Attestation Period:</dt>
        <dd>
          <t>The contiguous time interval over which a VRO asserts conformance.</t>
        </dd>
        <dt>Anchor Event:</dt>
        <dd>
          <t>The cryptographic operation that binds a VRO to an immutable public settlement layer at issuance and at supersession.</t>
        </dd>
        <dt>Maturity Level:</dt>
        <dd>
          <t>One of three levels (Documented, Operational, Adversarial-ready) defined in this document.</t>
        </dd>
        <dt>Supersession:</dt>
        <dd>
          <t>The lifecycle event by which a new VRO replaces a prior VRO.</t>
        </dd>
      </dl>
    </section>
    <section anchor="architectural-overview">
      <name>Architectural Overview</name>
      <t>Conforming attestations under this standard are produced by a verification infrastructure organised as five architectural components. Internal design, scoring methodology, and calibration logic are not in scope for this document.</t>
      <t>The Evidence Ingestion and Normalization Layer accepts AI governance Evidence Artefacts from Subject Entity systems — model registries, identity-provider telemetry, prompt and output logs, sanctioned-application controls, incident records — and normalises representation across heterogeneous source formats.</t>
      <t>The Reconciliation Confidence Engine reconciles Conformance Claims against normalised evidence and produces a deterministic reconciliation output.</t>
      <t>The Verification State Machine maintains the lifecycle state of each VRO through intake, evidence ingestion, reconciliation, anchoring, issuance, supersession, and revocation.</t>
      <t>Entity Graph Propagation propagates verification state across related entities where continuity is in scope.</t>
      <t>The Attestation Protocol produces the final VRO, performs the Anchor Event, registers the artefact in the public attestation registry, and binds the issuing-partner identity.</t>
      <t>Conforming attestations are deterministic. Given the same Conformance Claims and the same Evidence Artefacts processed through the same Attestation Protocol version, the same VRO <bcp14>SHALL</bcp14> be produced. Determinism applies to the verification operation, not to the AI systems being verified.</t>
    </section>
    <section anchor="ai-governance-verification-requirements">
      <name>AI Governance Verification Requirements</name>
      <t>The following subsections specify the eight control areas through which agentic AI governance is reconciled under this standard.</t>
      <section anchor="area-1-ai-inventory-and-shadow-ai-discovery">
        <name>Area 1: AI inventory and shadow-AI discovery</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity maintains a current inventory of AI Systems in operation across its workforce, integrations, and infrastructure, and detects use of unsanctioned or undisclosed AI Systems within its operating environment.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>AI System register; identity-provider telemetry of AI service authentications; endpoint or network telemetry of model API egress; sanctioned-application register; shadow-AI detection output; periodic reconciliation reports.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of declared inventory against detected use across the Attestation Period; exception cases reconciled against the disclosure or remediation register.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at Attestation Period start and end. Material expansions of inventory require a supersession anchor.</t>
          </dd>
        </dl>
      </section>
      <section anchor="area-2-use-case-classification-and-risk-assessment">
        <name>Area 2: Use-case classification and risk assessment</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity classifies each AI System by use-case category and risk tier, and records the classification together with the rationale and the residual-risk position.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>Use-case classification register; risk assessment artefact for each AI System; risk-tier policy artefact; review records evidencing periodic reassessment; exception register for ungoverned use cases.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of declared classifications against the policy taxonomy; reconciliation of risk tier against deployment context evidence; identification of classification drift over the Attestation Period.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at issuance; supersession on material change in deployment context, risk tier, or use-case scope.</t>
          </dd>
        </dl>
      </section>
      <section anchor="area-3-model-and-data-provenance">
        <name>Area 3: Model and data provenance</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity records and maintains provenance evidence for each AI System in use, including model identity, model version, Model Provider identity, training data disclosures (where available), and update or fine-tuning lineage.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>Model registry entries with provider, version, and lineage data; Model Provider transparency reports or model cards where supplied; training data attestations where available; fine-tuning records; vendor change log.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of recorded provenance against AI System operational state; reconciliation of fine-tuning lineage against change-management evidence; identification of model-version drift across the Attestation Period.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at issuance and at each material model-version change or Model Provider change.</t>
          </dd>
        </dl>
      </section>
      <section anchor="area-4-sanctioned-application-control">
        <name>Area 4: Sanctioned-application control</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity restricts use of AI Systems to those that have been explicitly sanctioned for the applicable user population and use-case context, consistent with the asserted Maturity Level.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>Sanctioned-application allow-list policy; endpoint or network enforcement evidence; exception register; user-population scope evidence; periodic review records.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of declared allow-list against enforcement telemetry; reconciliation of exception cases against the exception register; identification of unsanctioned use over the Attestation Period.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at issuance and on material allow-list changes.</t>
          </dd>
        </dl>
      </section>
      <section anchor="area-5-prompt-and-output-governance">
        <name>Area 5: Prompt and output governance</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity governs the content of prompts submitted to AI Systems and outputs produced by AI Systems, including controls preventing disclosure of sensitive data to external AI Systems and controls preventing high-risk output content from entering downstream processes.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>Prompt-content policy artefact; output-content policy artefact; prompt-monitoring telemetry; output-review telemetry; data-loss-prevention rules applied to AI traffic; high-risk content exception register.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of declared content controls against monitoring telemetry; reconciliation of exception handling against review evidence; identification of control bypass or drift over the Attestation Period.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at issuance and on each material change in control scope, sensitive-content taxonomy, or enforcement state.</t>
          </dd>
        </dl>
      </section>
      <section anchor="area-6-identity-and-access-control-for-ai">
        <name>Area 6: Identity and access control for AI</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity enforces identity and access controls on the use of AI Systems consistent with the asserted Maturity Level, including authentication, authorisation, multi-factor enforcement, and segregation between human and machine principals.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>Identity-provider telemetry for AI service authentications; access assignment register for AI Systems; multi-factor enrolment coverage report; service-account inventory; access review records.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of declared access model against assignment register; reconciliation of multi-factor enforcement against identity-provider evidence; reconciliation of service-account use against the inventory and policy.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at issuance and at the conclusion of each scheduled access review cycle.</t>
          </dd>
        </dl>
      </section>
      <section anchor="area-7-logging-telemetry-and-auditability">
        <name>Area 7: Logging, telemetry, and auditability</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity captures, retains, and protects logs of AI System use sufficient to permit retrospective reconstruction of governance-relevant events, with retention and integrity properties consistent with the asserted Maturity Level.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>Logging policy artefact; log content schema; log retention configuration; log-integrity attestation; access-control evidence for log stores; sampling or audit records.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of declared logging scope against captured content; reconciliation of asserted retention against log-store configuration; reconciliation of asserted integrity properties against evidence of log-store immutability or chain protection.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at issuance and on material changes to logging scope, retention, or integrity configuration.</t>
          </dd>
        </dl>
      </section>
      <section anchor="area-8-incident-drift-and-escalation-response">
        <name>Area 8: Incident, drift, and escalation response</name>
        <dl>
          <dt>Subject Claim:</dt>
          <dd>
            <t>The Subject Entity operates an incident-response capability for AI-related events, including hallucination, output failure, prompt-injection, data exfiltration, model drift, and high-impact misuse, with defined escalation paths and post-event review consistent with the asserted Maturity Level.</t>
          </dd>
          <dt>Evidence Categories:</dt>
          <dd>
            <t>AI incident-response policy; incident register; incident classification taxonomy; escalation records; post-event review reports; remediation evidence; drift-monitoring telemetry.</t>
          </dd>
          <dt>Verification Expectation:</dt>
          <dd>
            <t>Reconciliation of declared response capability against the incident register over the Attestation Period; reconciliation of escalation evidence against the declared escalation paths; reconciliation of remediation evidence against committed actions.</t>
          </dd>
          <dt>Anchor Requirement:</dt>
          <dd>
            <t>Anchored at issuance and at the conclusion of each material incident response or post-event review cycle.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="maturity-level-attestation">
      <name>Maturity Level Attestation</name>
      <t>A conforming VRO under this standard <bcp14>SHALL</bcp14> attest a Maturity Level for each of the eight control areas. Different control areas <bcp14>MAY</bcp14> attest at different Maturity Levels within a single VRO; the overall VRO attestation is the minimum Maturity Level attested across the eight control areas unless otherwise asserted.</t>
      <t>Maturity Level Documented reflects the baseline expectation that governance content exists, that policy artefacts are written, that an inventory is maintained, and that a designated owner is accountable. Evidence requirements at this level emphasise the existence of declared content and basic operational artefacts over an Attestation Period of at least three (3) consecutive months.</t>
      <t>Maturity Level Operational reflects the expectation that controls are not only documented but exercised: telemetry collected, periodic reviews occurring, exceptions recorded and handled, and the governance surface responding to material change. Evidence requirements add depth of telemetry, review-cadence evidence, exception handling, and continuity over an Attestation Period of at least six (6) consecutive months.</t>
      <t>Maturity Level Adversarial-ready reflects the expectation that governance withstands adversarial conditions: prompt-injection attempts, model-drift events, data-exfiltration attempts via AI channels, sophisticated misuse, and dependency failures at the Model Provider. Evidence requirements add continuity, defence-in-depth evidence, red-team or adversarial evaluation attestation where in scope, and continuous reconciliation over an Attestation Period of at least twelve (12) consecutive months.</t>
      <t>A Subject Entity that progresses to a higher Maturity Level for any control area <bcp14>SHALL</bcp14> be issued a superseding VRO recording the progression. The prior VRO is preserved and marked as superseded.</t>
    </section>
    <section anchor="verification-reconciliation-object-vro">
      <name>Verification Reconciliation Object (VRO)</name>
      <t>A conforming VRO under this standard <bcp14>SHALL</bcp14> contain, at minimum:</t>
      <ul spacing="normal">
        <li>
          <t>Subject Entity identifier.</t>
        </li>
        <li>
          <t>Attestation Period start and end timestamps.</t>
        </li>
        <li>
          <t>Maturity Level attested for each of the eight control areas.</t>
        </li>
        <li>
          <t>Conformance Claims as asserted by the Subject Entity.</t>
        </li>
        <li>
          <t>Evidence categories ingested and reconciliation outcome for each.</t>
        </li>
        <li>
          <t>AI System inventory snapshot at Attestation Period end.</t>
        </li>
        <li>
          <t>Issuing Partner identity and seat designation.</t>
        </li>
        <li>
          <t>Anchor Event identifiers binding the VRO to the public settlement layer.</t>
        </li>
        <li>
          <t>Verification State Machine state at issuance.</t>
        </li>
        <li>
          <t>Supersession chain reference, where applicable.</t>
        </li>
        <li>
          <t>Conformance statement of this standard, version 1.0.</t>
        </li>
      </ul>
      <t>A VRO <bcp14>MAY</bcp14> be revoked by the Issuing Partner upon determination of material non-conformance, evidence falsification, undisclosed incidents, or other circumstances rendering the original attestation unreliable. Revocation does not delete the VRO; it records a revocation state, the revocation reason class, and the Anchor Event binding the revocation to the public settlement layer.</t>
      <t>Each issued VRO <bcp14>SHALL</bcp14> be registered in the public attestation registry.</t>
    </section>
    <section anchor="issuing-partner-requirements">
      <name>Issuing Partner Requirements</name>
      <t>An organisation seeking designation as an Issuing Partner under this standard <bcp14>SHALL</bcp14> demonstrate, at minimum:</t>
      <ul spacing="normal">
        <li>
          <t>Operational capacity to assess AI governance posture across the eight control areas at the Maturity Level for which issuance is sought.</t>
        </li>
        <li>
          <t>Demonstrable competence in AI deployment models, identity and access controls, prompt and output monitoring, and incident response.</t>
        </li>
        <li>
          <t>Independence from the Subject Entity at the engagement level, with declared conflicts of interest disclosed and managed.</t>
        </li>
        <li>
          <t>Independence from any Model Provider whose models are within the scope of attestation, or, where dependency exists, declared and managed under a stated independence protocol.</t>
        </li>
        <li>
          <t>Adherence to the protocol operator's Partner Code of Conduct.</t>
        </li>
        <li>
          <t>Acceptance of the Designation Schedule terms applicable to the relevant market and seat.</t>
        </li>
      </ul>
      <t>An Issuing Partner <bcp14>SHALL NOT</bcp14>, for a given Subject Entity engagement, simultaneously act as the implementing vendor, deployment integrator, or operator of the AI Systems being verified.</t>
    </section>
    <section anchor="cryptographic-continuity-requirements">
      <name>Cryptographic Continuity Requirements</name>
      <t>Each VRO <bcp14>SHALL</bcp14> be cryptographically anchored to an immutable public settlement layer at the Anchor Event. The hash committed at the Anchor Event <bcp14>SHALL</bcp14> be a one-way function of the VRO content, Issuing Partner identity, and timestamp, computed under a digest algorithm of at least 256-bit strength.</t>
      <t>A VRO issued under this standard <bcp14>SHALL</bcp14> remain a conforming artefact across regulatory regime changes occurring within or after the Attestation Period.</t>
      <t>The Anchor Event binding <bcp14>SHALL</bcp14> remain independently verifiable in the event of a Model Provider ceasing to operate, withdrawing a model, or being acquired or restructured. VROs issued during the operating life of a withdrawn model are not retroactively invalidated.</t>
    </section>
    <section anchor="standards-alignment">
      <name>Standards Alignment</name>
      <t>This standard is interoperable with adjacent frameworks. Conforming VROs <bcp14>MAY</bcp14> be referenced within audit, certification, and regulatory artefacts produced under:</t>
      <t>ISO/IEC 42001:2023 <xref target="ISO42001"/>: AI management-system controls map to the eight control areas in this document.</t>
      <t>NIST AI Risk Management Framework <xref target="NIST-AI-RMF"/>: Functions (Govern, Map, Measure, Manage) map to evidence categories within the eight control areas.</t>
      <t>EU AI Act <xref target="EU-AI-ACT"/>: Provider and deployer obligations <bcp14>MAY</bcp14> be evidenced through conforming VROs where the obligation is verifiable through reconcilable evidence. The EU AI Act remains authoritative for legal compliance determinations.</t>
      <t>ISO/IEC 27001:2022 <xref target="ISO27001"/>: AI control areas intersecting information security are interoperable with ISO 27001 Annex A controls.</t>
      <t>Essential Eight Verified <xref target="I-D.hillier-certisyn-essential-eight-verified"/> cross-references application control, privilege restriction, and authentication evidence categories.</t>
    </section>
    <section anchor="conformance">
      <name>Conformance</name>
      <t>An attestation artefact <bcp14>MAY</bcp14> claim conformance to this standard if and only if it satisfies every requirement specified in this document. Partial conformance is not recognised. Variant conformance to a subset of control areas without the full eight-area scope is not recognised.</t>
      <t>The public attestation registry constitutes the authoritative record of issued VROs.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Agentic AI governance operates under adversarial conditions distinct from traditional cybersecurity. Implementations of this standard <bcp14>SHOULD</bcp14> pay particular attention to prompt-injection resistance, model-drift detection, and exfiltration paths through AI channels that may bypass traditional data-loss-prevention controls.</t>
      <t>Issuing Partners are required to be independent from the Subject Entity and from Model Providers whose models are within attestation scope.</t>
      <t>The Anchor Event binding <bcp14>SHOULD</bcp14> use a digest algorithm of at least 256-bit strength and a public settlement layer with no single private operator capable of extinguishing the binding.</t>
      <t>This standard does not address the correctness or safety of the AI Systems being governed. It addresses the verifiability of governance applied to those systems.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ISO42001">
          <front>
            <title>Information technology — Artificial intelligence — Management system</title>
            <author initials="I. O. for" surname="Standardization" fullname="International Organization for Standardization">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="ISO/IEC" value="42001:2023"/>
        </reference>
        <reference anchor="ISO27001">
          <front>
            <title>Information security, cybersecurity and privacy protection — Information security management systems — Requirements</title>
            <author initials="I. O. for" surname="Standardization" fullname="International Organization for Standardization">
              <organization/>
            </author>
            <date year="2022"/>
          </front>
          <seriesInfo name="ISO/IEC" value="27001:2022"/>
        </reference>
        <reference anchor="NIST-AI-RMF">
          <front>
            <title>AI Risk Management Framework</title>
            <author initials="N. I. of S. and" surname="Technology" fullname="National Institute of Standards and Technology">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
        </reference>
        <reference anchor="EU-AI-ACT">
          <front>
            <title>Regulation (EU) 2024/1689 — Artificial Intelligence Act</title>
            <author initials="E." surname="Union" fullname="European Union">
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="I-D.hillier-certisyn-essential-eight-verified">
          <front>
            <title>Essential Eight Verified — A Cryptographic Verification Standard for the ACSC Essential Eight Maturity Model</title>
            <author initials="J. D." surname="Hillier" fullname="Joel David Hillier">
              <organization/>
            </author>
            <date year="2026" month="May"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 349?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author thanks the ANZ Founding Partner cohort for early review of this draft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
