Controls/Agent-to-Agent Security/7.4
L2 StandardAutomated verification

7.4 Communication Logging

7. Agent-to-Agent SecurityHow do agents trust each other?

Description

All agent-to-agent communication MUST be logged.

Rationale

Logs enable detection of anomalous communication and forensic analysis.

Audit Procedure

1. Check if A2A communications are logged
2. Verify logs include required fields
3. Check log retention

Remediation

1. Log all A2A communications
2. Use structured logging
3. Send to centralized SIEM

Framework Mappings

CIS Control 8.2NIST DE.CM-1