The AIUC-1 Compliance Checklist: 5 Layers Every Enterprise Needs Before Deploying AI Agents

April 2, 2026
Share on Bluesky

A quick-reference checklist for AIUC-1 compliance. Five layers, 28 controls, one page. Print it, pin it, pass the audit.

No single tool passes AIUC-1. You need five layers. Here's the checklist.

Layer 1: Control Plane (Access & Enforcement Gateway)

Deploy first. Everything else depends on this.

  • Centralized gateway deployed — all agent-to-tool traffic flows through a single enforcement point

  • Tool-level authorization active — agents can only access specific tools they're authorized for, not entire servers

  • Identity-aware policies configured — every request is authenticated via SSO/JWT with verified user context

  • Session tracking enabled — multi-step agent workflows tracked as continuous sessions

  • Comprehensive audit logging active — every request logged with: agent identity, user context, tool called, parameters, policy decision, timestamp, session ID

  • Rate limiting configured — per-agent and per-route request limits prevent scraping and DoS

  • Multi-tenant isolation validated — Customer A's agents cannot access Customer B's data

  • Deployment model assessed — cloud vs. self-hosted decision documented

AIUC-1 controls covered: B006, B004, B007, A003, A005, E004, E015, E005

Tool: Pomerium Agentic Gateway

Layer 2: Model Safety & Content Filtering

Controls what agents output — independent of what they access.

  • Input filtering deployed — prompt injection and jailbreak attempts caught before reaching the model

  • Output filtering deployed — harmful, toxic, biased, or deceptive content blocked before reaching users

  • PII detection active — personal data in agent outputs is detected and redacted

  • Hallucination detection enabled — fabricated facts and data flagged before delivery

  • CBRN guardrails configured — content policies block chemical, biological, radiological, and nuclear misuse

  • Filtering events logged — every blocked or flagged input/output is logged with reason

AIUC-1 controls covered: C003, D001, B005, F001, F002

Tools: Azure AI Content Safety, AWS Bedrock Guardrails, Protect AI, Anthropic/OpenAI built-in safety

Layer 3: Testing & Red-Teaming

Quarterly validation that Layers 1 and 2 actually work.

  • Adversarial testing program established — quarterly red-teaming with documented methodology

  • Pre-deployment testing required — all agent changes tested against risk categories before production

  • Third-party safety evaluation scheduled — external firm evaluates safety at least quarterly

  • Hallucination benchmarks tracked — hallucination rates measured and compared to baseline quarterly

  • Regression suite automated — previous adversarial findings re-tested every quarter

  • Test results documented — pass/fail, findings, remediation steps, sign-off

AIUC-1 controls covered: B001, C002, C004, D002

Services: Schellman (authorized AIUC-1 auditor), HackerOne AI, Bishop Fox, internal security teams

Layer 4: Observability & Detection

Turns raw logs into intelligence and compliance reports.

  • Log aggregation pipeline configured — gateway logs, model logs, and application logs centralized

  • Anomaly detection rules active — unusual request patterns, suspected attacks flagged automatically

  • Compliance dashboards built — real-time view of: top agents by request count, denied requests, data access trends

  • Alerting configured — automated alerts for policy violations, rate limit breaches, suspected exfiltration

  • Audit report generation automated — quarterly compliance reports generated from aggregated data

AIUC-1 controls covered: B002, E015 (augmented)

Tools: Splunk, Elastic, Microsoft Sentinel, Datadog, Grafana

Layer 5: Governance & Process

The organizational layer auditors evaluate alongside technology.

  • Data use policies written — what agents can access, how outputs can be used, retention periods

  • Risk taxonomy defined — formal classification of AI risks (hallucination, misuse, PII leak, adversarial attack)

  • Incident response plans created — playbooks for: data breach, harmful output, hallucination in sensitive context

  • Accountability matrix documented — RACI for every AIUC-1 control with named owners

  • Vendor due diligence process established — evaluation checklist for model providers, tool vendors, auditors

  • CBRN safeguards documented — written guardrails against catastrophic misuse scenarios

  • All governance docs reviewed and signed off — CISO, legal, business leadership approval

AIUC-1 controls covered: A001, A002, C001, E001, E002, E003, E004, E006, F001, F002

Implementation Timeline

Phase

Weeks

Focus

Controls

Phase 1

1–4

Deploy control plane + audit logging

B006, B004, B007, A003, A005, E004, E015, E005

Phase 2

5–8

Content filtering + model safety

C003, D001, B005, F001/F002

Phase 3

9–12

Governance documentation

A001, A002, C001, E001–E003, E006

Phase 4

Ongoing

Quarterly testing cycle

B001, C002, C004, D002

Quick Self-Assessment

Answer these five questions. If any answer is "no," you have a gap:

  1. Does every agent request flow through a centralized enforcement point? (If no → you need Layer 1)

  2. Are agent outputs filtered for harmful content, PII, and hallucinations? (If no → you need Layer 2)

  3. Do you run adversarial tests at least quarterly? (If no → you need Layer 3)

  4. Can you generate a compliance report from your logs in under an hour? (If no → you need Layer 4)

  5. Does every AIUC-1 control have a documented owner? (If no → you need Layer 5)

Start With Layer 1

The most common mistake is starting with governance (Layer 5) or observability (Layer 4) before deploying a control plane (Layer 1). Without centralized enforcement and logging, everything else is unverifiable.

Deploy the control plane first. The rest follows.

Get started with Pomerium →

Further reading: NIST AI Risk Management Framework · MITRE ATLAS · OWASP LLM Top 10 · AIUC-1 Standard

Share: Share on Bluesky

Stay Connected

Stay up to date with Pomerium news and announcements.

More Blog Posts

See All Blog Posts
Blog
What Is an Agentic Gateway? Definition, Architecture, and Why It's Different from an API Gateway
Blog
The AIUC-1 Compliance Stack: The Architecture Auditors Are Actually Looking For
Blog
Midmarket Security Teams Deserve Better Than Enterprise Hand-Me-Downs

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.