AI Governance Institute logo
AI Governance Institute

Practical Governance for Enterprise AI

Agentic AI
AGT · Agentic AIAGT-006Medium effortAgent-relevant

Agent Action Audit Trail

Log every tool call, decision step, memory read/write, and external interaction made by an AI agent so that the full action sequence can be reconstructed after the fact.

Objective

Enable post-hoc accountability and incident investigation for agent-driven workflows by maintaining a complete, tamper-evident action log.

Maturity Levels

1

Initial

Agent actions are not logged; only final outputs are available for review.

2

Developing

Some agent actions are logged but coverage is incomplete and logs are not structured for audit use.

3

Defined

All tool calls, decision points, and external interactions are logged with timestamps, inputs, outputs, and agent identity.

4

Managed

Logs are centralized, retained per policy, and queried regularly during incident investigations and governance reviews.

5

Optimizing

Logs are analyzed automatically for anomaly detection; structured log data feeds model improvement pipelines.

Evidence Requirements

What an auditor or assessor would expect to see for this control.

  • Log schema documentation specifying required fields, storage type (append-only), access controls, and retention period
  • Sample audit log entries confirming all required fields are present and populated for a representative set of agent workflows
  • Storage integrity configuration evidence confirming write-once, access-controlled storage with no modify or delete access for normal operations
  • Retention compliance report confirming logs are maintained for the required period
  • Cross-agent trace records demonstrating trace_id propagation across agent boundaries for at least one multi-agent workflow

Implementation Notes

Key steps

  • Log at the tool boundary, not just the model response: capture the exact call made, the parameters passed, and the raw response returned — model summaries of tool results are unreliable.
  • Include a session/trace ID that links all steps in a single agent workflow, enabling full reconstruction of multi-step sequences.
  • Treat agent logs with the same integrity requirements as financial audit logs: write-once, tamper-evident storage, access-controlled.
  • For multi-agent systems, propagate the originating trace ID across agent boundaries so cross-agent workflows can be traced end-to-end.

Example Implementation

Finance team using an AI agent to prepare and submit regulatory filings

Agent Audit Log Schema — Regulatory Filing Agent

Required fields per log entry:

FieldTypeDescription
trace_idUUIDLinks all steps in one filing workflow
step_seqIntegerStep number within trace
agent_idStringAgent version identifier
tool_nameStringExact tool or API called
tool_inputJSONFull parameters passed (PII hashed)
tool_output_hashSHA-256Hash of raw tool response
tool_output_summaryStringNon-sensitive summary for review
timestampISO-8601UTC timestamp of tool execution
outcomeEnumSUCCESS / ERROR / REJECTED

Storage: Append-only log store; no delete or modify access except to designated retention manager after documented hold period

Retention: 10 years (EU AI Act Art. 12 high-risk logging requirement)

Cross-agent: trace_id propagated to any sub-agent invocations to enable end-to-end reconstruction

Control Details

Control ID
AGT-006
Typical owner
AI Engineering / CISO
Implementation effort
Medium effort
Agent-relevant
Yes

Tags

audit trailagent loggingtraceabilityobservability