aicomply.
STD-AI-005

AI Logging and Record Keeping Standard

Implement automated logging of AI system operations with appropriate retention (minimum 6 months per Article 19, up to 10 years for documentation per Article 18).

2

Controls

0

Compliant

2

In Progress

0

Not Started

Overall Progress
50%
Implementation Guidance
Detailed guidance for implementing this standard

AI Logging and Record Keeping Standard

Document Type: Standard
Standard ID: STD-AI-005
Standard Title: AI Logging and Record Keeping Standard
Version: 1.0
Effective Date: 2025-08-01
Next Review Date: 2026-08-01
Review Frequency: Annually or upon regulatory change
Parent Policy: POL-AI-001 - Artificial Intelligence Policy
Owner: IT Security Manager
Approved By: AI Governance Committee Chair
Status: Draft
Classification: Internal Use Only


TABLE OF CONTENTS

  1. Document History
  2. Objective
  3. Scope and Applicability
  4. Control Standard
  5. Supporting Procedures
  6. Compliance
  7. Roles and Responsibilities
  8. Exceptions
  9. Enforcement
  10. Key Performance Indicators (KPIs)
  11. Training Requirements
  12. Definitions
  13. Link with AI Act and ISO42001

DOCUMENT HISTORY

VersionDateAuthorChangesApproval DateApproved By
0.12025-06-28Thomas Wilson, IT Security ManagerInitial draft--
0.22025-07-12Thomas Wilson, IT Security ManagerAdded retention details--
0.32025-07-25Thomas Wilson, IT Security ManagerIncorporated security feedback--
1.02025-08-01Thomas Wilson, IT Security ManagerFinal version approved - GRC restructured2025-07-25Jane Doe, AI Governance Committee Chair

OBJECTIVE

This standard defines requirements for automated logging of AI system operations and record-keeping in compliance with EU AI Act Article 12, with logs retained for at least 6 months per Article 19(1) (note: technical documentation has a separate 10-year retention under Article 18(1)).

Primary Goals:

  • Implement automated logging per Article 12(1) for all high-risk AI systems
  • Retain logs for at least 6 months per Article 19(1) with secure storage (note: technical documentation has a separate 10-year retention under Article 18(1))
  • Enable appropriate access to logs for monitoring, investigation, and regulatory compliance

SCOPE AND APPLICABILITY

2.1 Mandatory Applicability

This standard is mandatory for:

  • All high-risk AI systems (EU AI Act Article 12)
  • All AI system operations and events

2.2 Recommended Applicability

This standard is recommended for:

  • All AI systems for operational monitoring
  • Limited-risk and minimal-risk AI systems (voluntary best practices)

2.3 Logging Coverage

  • System operations and events
  • Input data and outputs
  • User interactions
  • System errors and exceptions
  • Configuration changes
  • Access and authentication events

2.4 Out of Scope

  • General IT system logging (covered by IT logging standards)
  • Non-AI system logging (covered by other logging standards)
  • Logging outside EU AI Act scope

CONTROL STANDARD

Control LOG-001: Automated Logging Requirements

Control ID: LOG-001
Control Name: Automated Logging Implementation
Control Type: Preventive
Control Frequency: Continuous
Risk Level: High

Control Objective

Implement automated logging per Article 12(1) to capture all required log elements for high-risk AI systems, enabling traceability, auditability, and regulatory compliance.

Control Requirements

CR-001.1: Mandatory Log Elements

Capture all required log elements per Article 12(1) and additional operational elements.

General Logging Requirement (Article 12(1)):

Article 12(1) requires all high-risk AI systems to technically allow for the automatic recording of events (logs) over the lifetime of the system to enable post-market monitoring and investigation.

Specific Log Elements for Remote Biometric Identification Systems (Article 12(3) -- Annex III #1(a) only):

The following four specific elements are mandated ONLY for high-risk AI systems referred to in point 1(a) of Annex III (remote biometric identification systems). They do NOT apply to all high-risk AI systems.

ElementDescriptionMandatoryExample
Period of UseStart and end time of each AI system useYES (Annex III #1(a) systems only)2025-08-01 10:00:00 - 10:05:23
Reference DatabaseDatabase against which input data checkedYES (Annex III #1(a) systems only)Database ID, version
Matched Input DataInput data for which search led to matchYES (Annex III #1(a) systems only)Input data hash, reference
Person VerificationIdentification of persons verifying resultsYES (Annex III #1(a) systems only)User ID, role

Additional Logging Requirements:

ElementDescriptionMandatoryExample
TimestampDate and time (UTC)YES2025-08-01T10:00:00Z
User IdentificationUser ID, role, organizationYESuser123, admin, org1
Action PerformedType of operation/actionYESsearch, decision, classification
Input Data SummarySummary/hash of input dataYESSHA-256 hash, data type
Output/DecisionAI system output or decisionYESDecision: approve, confidence: 0.95
Confidence ScoresConfidence/probability scores (if applicable)If applicable0.95, 0.87
System VersionAI system version usedYESv2.1.3
Configuration UsedConfiguration parametersYESConfig ID, parameters

Mandatory Actions:

  • Implement automated logging (no manual intervention)
  • Capture all mandatory log elements
  • Capture additional operational elements
  • Log in real-time or near-real-time
  • Ensure logging cannot be disabled
  • Verify logging operational continuously

Evidence Required:

  • Logging configuration documentation
  • Logging infrastructure documentation
  • Log sample verification
  • Logging health monitoring records

Audit Verification:

  • Verify automated logging implemented for all high-risk AI
  • Confirm all mandatory log elements captured
  • Check logging operational continuously
  • Validate log samples contain all required elements

Control LOG-002: Logging Infrastructure

Control ID: LOG-002
Control Name: Logging Infrastructure and Tamper Protection
Control Type: Preventive
Control Frequency: Continuous
Risk Level: High

Control Objective

Implement robust, tamper-proof logging infrastructure with high availability to ensure reliable log capture, storage, and protection throughout the required retention period (at least 6 months per Article 19(1)).

Control Requirements

CR-002.1: Infrastructure Requirements

Implement logging infrastructure meeting all requirements.

Infrastructure Requirements:

RequirementSpecificationImplementation
AutomationFully automated, no manual interventionAutomated logging framework
Real-TimeReal-time or near-real-time logging (< 1 second delay)Real-time log collection
Tamper-ProofLogs cannot be modified or deletedWrite-once storage, cryptographic integrity
CentralizedCentralized log managementCentralized log management system
ScalableHandle expected log volumeScalable infrastructure
High Availability≥99.9% uptimeHA configuration, redundancy
Integrity ProtectionCryptographic integrity verificationHash chains, digital signatures

Mandatory Actions:

  • Implement logging framework
  • Configure log collection
  • Enable tamper protection (write-once storage)
  • Set up centralized storage
  • Implement high availability
  • Monitor logging health continuously
  • Alert on logging failures

Tamper Protection Mechanisms:

  • Write-once storage (WORM - Write Once Read Many)
  • Cryptographic hash chains
  • Digital signatures
  • Immutable log storage
  • Access controls preventing log modification
  • Integrity verification

Evidence Required:

  • Logging infrastructure documentation
  • Configuration records
  • Health monitoring dashboard
  • Availability metrics
  • Tamper protection verification
  • Integrity verification records

Audit Verification:

  • Verify logging infrastructure implemented
  • Confirm tamper protection enabled
  • Check high availability configured
  • Validate centralized storage operational
  • Verify health monitoring active

Control LOG-003: Log Retention and Storage

Control ID: LOG-003 Control Name: Log Retention and Storage
Control Type: Preventive
Control Frequency: Continuous
Risk Level: High

Control Objective

Retain all logs for at least 6 months per Article 19(1) (providers) and Article 26(6) (deployers) with secure storage, backup, and retrieval capability to support audits, investigations, and regulatory compliance. Note: technical documentation has a separate 10-year retention under Article 18(1).

Control Requirements

CR-003.1: Retention and Storage Implementation

Implement at least 6-month retention for logs per Article 19(1) with secure storage and retrieval capability.

Retention Requirements:

RequirementSpecificationImplementation
Retention PeriodAt least 6 months (logs); 10 years (technical documentation per Article 18(1))Automated retention policy
Secure StorageEncrypted, access-controlled storageSecure storage system
BackupDaily backups with 30-day retentionAutomated backup system
Disaster RecoveryRTO < 24 hours, RPO < 24 hoursDR plan and testing
ArchivalLong-term archival for old logsArchival system
RetrievalAbility to retrieve logs throughout retentionRetrieval system and testing

Mandatory Actions:

  • Configure at least 6-month retention policy for logs per Article 19(1)
  • Implement secure storage
  • Set up backup procedures (daily)
  • Enable archival for long-term storage (organizations may retain longer than minimum)
  • Test retrieval regularly (quarterly)
  • Monitor storage capacity
  • Plan for storage growth

Storage Capacity Planning:

YearEstimated Log VolumeStorage RequiredAction
Year 1[Volume][Storage]Initial storage allocation
Year 5[Volume][Storage]Capacity expansion
Year 10[Volume][Storage]Final capacity planning

Evidence Required:

  • Retention policy configuration
  • Storage capacity planning
  • Backup verification records
  • Retrieval test results
  • Archival records
  • Storage monitoring records

Audit Verification:

  • Verify at least 6-month log retention policy configured per Article 19(1)
  • Confirm secure storage implemented
  • Check backup procedures operational
  • Validate retrieval capability tested
  • Verify storage capacity monitored

Control LOG-004: Log Security and Access Control

Control ID: LOG-004
Control Name: Log Security and Access Management
Control Type: Preventive
Control Frequency: Continuous, quarterly reviews
Risk Level: High

Control Objective

Protect logs with encryption, access controls, and audit trails to prevent unauthorized access, modification, or deletion, ensuring log integrity and confidentiality throughout the retention period.

Control Requirements

CR-004.1: Security Controls Implementation

Implement comprehensive security controls for log storage and access.

Security Requirements:

ControlRequirementImplementation
Encryption at RestAES-256 or equivalentStorage encryption
Encryption in TransitTLS 1.3 or equivalentTransport encryption
Access ControlsRole-based access control (RBAC)RBAC system
Audit TrailLog all access to logsAccess logging
Tamper DetectionDetect unauthorized modificationsIntegrity monitoring
Integrity VerificationRegular integrity checksAutomated integrity verification

Access Levels:

RoleAccess LevelJustificationApproval Required
AI System OwnerFull read accessResponsible for AI systemAutomatic
Operations TeamRead access for monitoringOperational monitoringAI System Owner
Security TeamFull read accessSecurity monitoring and investigationSecurity Manager
Internal AuditRead accessAudit and compliance verificationAudit Manager
Competent AuthoritiesRead access (upon request)Regulatory oversight (Article 53)Legal + IT Security Manager
Log AdministratorsFull access (with approval)System administrationIT Security Manager

Mandatory Actions:

  • Enable encryption (at rest and in transit)
  • Configure role-based access controls
  • Log all access to logs
  • Implement tamper detection
  • Verify integrity regularly (monthly)
  • Review access quarterly
  • Revoke unnecessary access

Evidence Required:

  • Encryption configuration
  • Access control matrix
  • Access audit logs
  • Integrity verification records
  • Quarterly access reviews
  • Tamper detection alerts (if any)

Audit Verification:

  • Verify encryption enabled
  • Confirm access controls configured
  • Check access audit logs maintained
  • Validate integrity verification conducted
  • Verify quarterly access reviews completed

Control LOG-005: Log Analysis and Monitoring

Control ID: LOG-005
Control Name: Log Analysis, Monitoring, and Investigation Support
Control Type: Detective
Control Frequency: Continuous, regular analysis
Risk Level: Medium

Control Objective

Enable log analysis, monitoring, and investigation support to detect anomalies, support incident response, and provide insights for continuous improvement.

Control Requirements

CR-005.1: Monitoring and Analysis Implementation

Implement log monitoring, analysis, and investigation capabilities.

Monitoring Requirements:

CapabilityRequirementImplementation
Real-Time MonitoringMonitor critical events in real-timeReal-time monitoring system
Automated AlertingAlert on anomalies and critical eventsAlerting system
Regular AnalysisConduct regular log analysisAnalysis tools and processes
Trend AnalysisIdentify trends and patternsTrend analysis tools
Incident InvestigationSupport incident investigationInvestigation tools and procedures
ReportingGenerate regular reportsReporting system

Monitoring Rules and Alerts:

Alert TypeTriggerSeverityResponse
Logging FailureLogging system down or not capturing logsCriticalImmediate escalation
Tamper DetectionUnauthorized log modification detectedCriticalImmediate escalation to Security
Anomalous ActivityUnusual patterns or volumesHighInvestigation required
Access ViolationUnauthorized access attemptHighSecurity investigation
System ErrorsHigh error rateMediumOperations investigation
Performance DegradationSlow response timesMediumOperations investigation

Mandatory Actions:

  • Configure monitoring rules
  • Set up alerting
  • Conduct regular analysis (weekly)
  • Generate trend reports (monthly)
  • Support incident investigations
  • Document analysis findings
  • Review monitoring effectiveness (quarterly)

Evidence Required:

  • Monitoring dashboard
  • Alert configurations
  • Analysis reports (weekly)
  • Trend reports (monthly)
  • Investigation records
  • Monitoring effectiveness reviews (quarterly)

Audit Verification:

  • Verify monitoring implemented
  • Confirm alerting configured
  • Check regular analysis conducted
  • Validate trend reports generated
  • Verify investigation support available

SUPPORTING PROCEDURES

This standard is implemented through the following detailed procedures:

Procedure PROC-AI-LOG-001: Logging Configuration Procedure

Purpose: Define step-by-step process for configuring automated logging
Owner: IT Security Manager
Implements: Controls LOG-001, LOG-002

Procedure Steps:

  1. Identify AI system requiring logging
  2. Configure logging framework - Control LOG-002
  3. Configure mandatory log elements - Control LOG-001
  4. Configure additional log elements
  5. Enable tamper protection
  6. Configure centralized storage
  7. Test logging functionality
  8. Monitor logging health

Outputs:

  • Logging configuration
  • Logging infrastructure documentation
  • Health monitoring setup

Procedure PROC-AI-LOG-002: Log Retention and Access Procedure

Purpose: Define process for log retention, storage, and access management
Owner: IT Security Manager
Implements: Controls LOG-003, LOG-004, LOG-005

Procedure Steps:

  1. Configure at least 6-month log retention policy per Article 19(1) - Control LOG-003
  2. Implement secure storage
  3. Configure encryption - Control LOG-004
  4. Configure access controls
  5. Set up backup procedures
  6. Enable archival
  7. Configure monitoring - Control LOG-005
  8. Test retrieval capability
  9. Review access quarterly

Outputs:

  • Retention policy configuration
  • Secure storage setup
  • Access control configuration
  • Backup and archival setup

COMPLIANCE

5.1 Compliance Monitoring

Monitoring Approach: Continuous automated monitoring supplemented by monthly manual reviews and quarterly comprehensive audits.

Compliance Metrics:

MetricTargetMeasurement MethodFrequencyOwner
Logging Availability≥99.9%% uptime of logging systemMonthlyIT Security Manager
Log Completeness100%% of AI operations loggedDailyIT Security Manager
Retention Compliance100%% of logs retained for at least 6 monthsMonthlyIT Security Manager
Access Control Compliance100%% of logs with proper access controlsMonthlyIT Security Manager
Authority Response Time< 5 daysAverage days to respond to authority requestsPer requestLegal
Integrity Verification100%% of logs with verified integrityMonthlyIT Security Manager

Monitoring Tools:

  • Logging Health Dashboard
  • Compliance Reports
  • Access Logs
  • Monthly compliance reports
  • Quarterly AI Governance Committee reviews

5.2 Internal Audit Requirements

Audit Frequency: Annually (minimum)

Audit Scope:

  • Logging implementation completeness
  • Logging infrastructure robustness
  • Retention policy compliance
  • Security controls effectiveness
  • Access control compliance
  • Monitoring and analysis effectiveness
  • Controls effectiveness (LOG-001 through LOG-005)

Audit Activities:

  • Review 100% of high-risk AI for logging implementation
  • Test logging infrastructure
  • Verify retention policy compliance
  • Test security controls
  • Review access controls
  • Test retrieval capability
  • Review monitoring effectiveness
  • Interview key personnel

Audit Outputs:

  • Annual Logging and Record Keeping Audit Report
  • Findings and recommendations
  • Corrective action plans for deficiencies

5.3 External Audit / Regulatory Inspection

Preparation:

  • Maintain audit-ready logging documentation at all times
  • Designate IT Security Manager and Legal as regulatory liaisons
  • Prepare standard response procedures for authority requests

Provide to Auditors/Regulators:

  • Logging infrastructure documentation
  • Log samples (anonymized if personal data)
  • Retention policy documentation
  • Security controls documentation
  • Access control records
  • Authority request logs
  • Logging procedures
  • Internal audit reports
  • Evidence of controls execution

Authority Request Response:

  • Acknowledge request within 1 business day
  • Provide requested logs within 5 business days
  • Coordinate through Legal and IT Security Manager
  • Document all interactions with authorities

ROLES AND RESPONSIBILITIES

6.1 RACI Matrix

ActivityIT Security ManagerAI System OwnerOperations TeamSecurity TeamInternal AuditLegal
Logging ImplementationR/AACCII
Logging InfrastructureR/AICCII
Retention ManagementR/AICIII
Security ControlsR/AIICII
Access ManagementR/AACCCC
Log MonitoringRARRII
Log AnalysisRARRII
Authority RequestsRIIIIR
Internal AuditCIIIR/AI

RACI Legend:

  • R = Responsible (does the work)
  • A = Accountable (ultimately answerable)
  • C = Consulted (provides input)
  • I = Informed (kept up-to-date)

6.2 Role Descriptions

IT Security Manager

  • Primary Responsibility: Owns logging framework, ensures compliance
  • Key Activities:
    • Implements logging infrastructure
    • Configures retention policies
    • Manages security controls
    • Manages access controls
    • Reports logging metrics
  • Required Competencies: EU AI Act Article 12, logging systems, security, retention management

AI System Owner

  • Primary Responsibility: Accountable for logging of their AI system
  • Key Activities:
    • Ensures logging implemented
    • Approves logging configuration
    • Monitors log availability
    • Participates in access reviews
  • Required Competencies: AI system knowledge, logging requirements

Operations Team

  • Primary Responsibility: Monitor logs for operational issues
  • Key Activities:
    • Monitor logs for errors
    • Analyze performance issues
    • Support incident investigation
  • Required Competencies: Log analysis, system operations

Security Team

  • Primary Responsibility: Monitor logs for security issues
  • Key Activities:
    • Monitor for security events
    • Investigate security incidents
    • Analyze security trends
  • Required Competencies: Security monitoring, incident response

Internal Audit

  • Primary Responsibility: Audit logging compliance
  • Key Activities:
    • Audit logging implementation
    • Test retention compliance
    • Review access controls
  • Required Competencies: Audit expertise, logging knowledge

Legal

  • Primary Responsibility: Manage authority requests
  • Key Activities:
    • Respond to authority requests
    • Coordinate log provision
    • Ensure legal compliance
  • Required Competencies: EU AI Act legal expertise, regulatory compliance

EXCEPTIONS

7.1 Exception Philosophy

Logging and record keeping is a critical regulatory compliance activity for high-risk AI systems. Exceptions are granted restrictively and only where compensating controls adequately mitigate risks.


7.2 Allowed Exceptions

The following exceptions may be granted with proper justification and approval:

Exception TypeJustification RequiredMaximum DurationApproval AuthorityCompensating Controls
Reduced Log Detail (Minimal-Risk AI)AI system clearly minimal-risk; reduced logging sufficientPermanentIT Security ManagerDocument rationale; Annual re-confirmation
Extended Retention Retrieval TimeTechnical constraints prevent immediate retrieval48 hoursIT Security ManagerDocument technical constraints; Accelerated retrieval plan

7.3 Prohibited Exceptions

The following exceptions cannot be granted under any circumstances:

Skipping logging for high-risk AI - Mandatory per Article 12(1), no exceptions
Reducing retention below 6 months - Mandatory per Article 19(1), no exceptions
Disabling tamper protection - Required for log integrity
Allowing unauthorized log modification - Violates integrity requirements
Ignoring authority requests - Required per Article 53


7.4 Exception Request Process

Step 1: Submit Exception Request

  • Complete Exception Request Form (FORM-AI-EXCEPTION-001)
  • Include business justification
  • Propose compensating controls
  • Specify duration requested
  • Attach risk assessment

Step 2: Risk Assessment

  • IT Security Manager assesses risk of granting exception
  • Evaluates adequacy of compensating controls
  • Documents residual risk

Step 3: Approval

  • Route to appropriate approval authority based on exception type
  • IT Security Manager approval: Minor exceptions
  • AI Governance Committee: Significant exceptions

Step 4: Documentation and Monitoring

  • Document exception in Exception Register
  • Assign exception owner
  • Set review date
  • Monitor compensating controls
  • Report exceptions quarterly to AI Governance Committee

Step 5: Exception Review and Closure

  • Review exception at specified review date
  • Assess if exception still needed
  • Close exception when normal logging completed
  • Document lessons learned

ENFORCEMENT

8.1 Non-Compliance Consequences

ViolationSeverityConsequenceRemediation Required
High-risk AI without loggingCriticalImmediate suspension until logging implementedImplement logging within 5 business days; Root cause analysis
Logging system failureCriticalImmediate escalation; System may need suspensionRestore logging within 4 hours; Root cause analysis
Retention below 6 monthsCriticalImmediate correction; Compliance gap assessmentExtend retention to at least 6 months; Assess impact
Tamper protection disabledHighImmediate correction; Security investigationRe-enable tamper protection; Security review
Unauthorized log accessHighSecurity investigation; Access revocationRevoke access; Security review; Disciplinary action
Late authority request responseMediumWritten warning; Escalation to managementRespond immediately; Process improvement plan

8.2 Escalation Procedures

Level 1: IT Security Manager

  • Minor procedural violations
  • Logging configuration issues
  • Timeline delays < 5 days
  • Action: Written warning, corrective action required

Level 2: IT Security Manager + AI Governance Committee

  • Repeated violations
  • Logging system failures
  • Retention issues
  • Action: Formal review, corrective action plan, management notification

Level 3: AI Governance Committee

  • High-risk AI without logging
  • Critical security violations
  • Regulatory violations
  • Action: Immediate AI system suspension, investigation, disciplinary action

Level 4: Executive Management + Legal

  • Potential regulatory enforcement action
  • Significant legal liability
  • Reputational risk
  • Action: Executive crisis management, legal strategy, regulatory engagement

8.3 Immediate Escalation Triggers

Escalate immediately to AI Governance Committee + Legal if:

  • ⚠️ High-risk AI system operating without logging
  • ⚠️ Logging system failure affecting multiple systems
  • ⚠️ Tamper detection alert
  • ⚠️ Unauthorized log deletion or modification
  • ⚠️ Regulatory inquiry or inspection related to logging
  • ⚠️ Authority request not responded to within 5 days

8.4 Disciplinary Actions

Individuals responsible for logging violations may be subject to:

  • Verbal or written warning
  • Mandatory retraining
  • Performance improvement plan
  • Reassignment of responsibilities
  • Suspension (with pay during investigation)
  • Termination (for egregious violations, e.g., knowingly disabling logging)

Factors Considered:

  • Intent (knowing violation vs. honest mistake)
  • Severity of violation
  • Impact (actual or potential)
  • Cooperation with remediation
  • Prior violation history

KEY PERFORMANCE INDICATORS (KPIs)

9.1 Logging and Record Keeping KPIs

KPI IDKPI NameDefinitionTargetMeasurement MethodFrequencyOwnerReporting To
KPI-LOG-001Logging Availability% uptime of logging system≥99.9%(Uptime / Total time) × 100MonthlyIT Security ManagerAI Governance Committee
KPI-LOG-002Log Completeness% of AI operations logged100%(# operations logged / # total operations) × 100DailyIT Security ManagerManagement
KPI-LOG-003Retention Compliance% of logs retained for at least 6 months100%(# logs retained / # logs created) × 100MonthlyIT Security ManagerAI Governance Committee
KPI-LOG-004Access Control Compliance% of logs with proper access controls100%(# logs with access controls / # total logs) × 100MonthlyIT Security ManagerManagement
KPI-LOG-005Authority Response TimeAverage days to respond to authority requests< 5 daysΣ (response date - request date) / # requestsPer requestLegalExecutive Management
KPI-LOG-006Integrity Verification% of logs with verified integrity100%(# logs verified / # total logs) × 100MonthlyIT Security ManagerManagement
KPI-LOG-007Log Analysis Completion% of scheduled log analyses completed100%(# analyses completed / # scheduled analyses) × 100MonthlyIT Security ManagerManagement
KPI-LOG-008Access Review Completion% of quarterly access reviews completed on time100%(# reviews on time / # scheduled reviews) × 100QuarterlyIT Security ManagerAI Governance Committee
KPI-LOG-009Tamper DetectionNumber of tamper attempts detected0Count of tamper attemptsContinuousIT Security ManagerAI Governance Committee
KPI-LOG-010Retrieval Test Success% of retrieval tests successful100%(# successful tests / # total tests) × 100QuarterlyIT Security ManagerManagement

9.2 KPI Dashboards and Reporting

Real-Time Dashboard (IT Security Manager access)

  • Current logging availability
  • Log completeness status
  • Retention compliance
  • Access control status
  • Tamper detection alerts
  • System health

Monthly Management Report

  • KPI-LOG-001, 002, 003, 004, 006, 007, 010
  • Trend analysis (vs. previous month)
  • Issues and risks
  • Planned actions

Quarterly AI Governance Committee Report

  • All KPIs
  • Logging infrastructure status
  • Retention compliance status
  • Security controls effectiveness
  • Internal audit findings (if conducted)
  • Exception register review

Annual Executive Report

  • Full-year KPI performance
  • Logging maturity assessment
  • Strategic recommendations
  • Regulatory outlook

9.3 KPI Thresholds and Alerts

KPIGreen (Good)Yellow (Warning)Red (Critical)Alert Action
Logging Availability≥99.9%99.0-99.8%< 99.0%Red: Immediate escalation to AI Governance Committee
Log Completeness100%95-99%< 95%Red: Immediate escalation to AI Governance Committee
Retention Compliance100%95-99%< 95%Red: Immediate escalation to AI Governance Committee
Tamper Detection0N/A> 0Red: Immediate escalation to Security + AI Governance Committee

TRAINING REQUIREMENTS

10.1 Training Program Overview

All personnel involved in logging and record keeping must complete role-specific training to ensure competency in EU AI Act Article 12 requirements, logging systems, and logging procedures.


10.2 Role-Based Training Requirements

RoleTraining CourseDurationContentFrequencyAssessment Required
IT Security ManagerLogging Management Expert Training16 hoursEU AI Act Article 12; Logging infrastructure; Retention management; Security controls; Access managementInitial + annuallyYes - Written exam (≥90%) + Practical exercise
Operations TeamLog Monitoring and Analysis8 hoursLog monitoring; Log analysis; Alerting; Incident investigationInitial + annuallyYes - Practical exercise
Security TeamSecurity Log Analysis12 hoursSecurity monitoring; Incident investigation; Threat detection; Log forensicsInitial + annuallyYes - Practical exercise
AI System OwnersLogging Overview4 hoursLogging requirements; Responsibilities; Access managementAt onboarding + annuallyYes - Knowledge check (≥80%)
All AI Development StaffLogging Awareness2 hoursLogging basics; When logging needed; Logging requirementsAt onboarding + annuallyYes - Knowledge check (≥80%)

10.3 Training Content by Topic

EU AI Act Article 12 Requirements

  • Mandatory log elements
  • At least 6-month retention requirement per Article 19(1) (technical documentation has separate 10-year retention under Article 18(1))
  • Authority access requirements
  • Compliance obligations

Logging Infrastructure

  • Logging frameworks
  • Centralized log management
  • Tamper protection
  • High availability
  • Scalability

Retention Management

  • At least 6-month log retention policy per Article 19(1)
  • Storage capacity planning
  • Backup and archival
  • Retrieval capability

Security Controls

  • Encryption (at rest and in transit)
  • Access controls
  • Audit trails
  • Tamper detection
  • Integrity verification

Log Analysis and Monitoring

  • Real-time monitoring
  • Automated alerting
  • Log analysis techniques
  • Trend analysis
  • Incident investigation

10.4 Training Delivery Methods

Initial Training:

  • Instructor-led classroom or virtual training
  • Includes interactive exercises and case studies
  • Hands-on practice with logging tools
  • Group discussions of complex scenarios

Annual Refresher:

  • E-learning modules for core content review
  • Live update sessions for regulatory changes
  • Case study reviews of recent logging activities
  • Knowledge assessment

On-the-Job Training:

  • Mentoring for new logging staff
  • Job shadowing during logging implementation
  • Supervised logging setup for first 3 AI systems

Just-in-Time Training:

  • Quick reference guides and job aids
  • Video tutorials on specific topics
  • Help desk support from experienced logging staff

10.5 Training Effectiveness Measurement

Assessment Methods:

  • Written exams for knowledge retention
  • Practical exercises for skill application
  • On-the-job observations for competency validation
  • Feedback surveys for training quality

Competency Validation:

  • IT Security Managers: Must configure logging for 1 sample AI system with 100% compliance before independent implementation
  • All staff: Must pass knowledge assessments with minimum required scores

Training Metrics:

MetricTargetFrequency
Training completion rate100%Quarterly
Assessment pass rate (first attempt)≥ 90%Per training
Training effectiveness score (survey)≥ 4.0/5.0Per training
Time to competency (IT Security Managers)< 30 daysPer person

10.6 Training Records

Records Maintained:

  • Training attendance records
  • Assessment scores
  • Competency validations
  • Refresher training completion
  • Individual training transcripts

Retention: At least 6 months for logs per Article 19(1); 10 years for technical documentation per Article 18(1)

Access: HR, IT Security Manager, Internal Audit, Competent Authorities (upon request)


DEFINITIONS

TermDefinitionSource
Automated LoggingAutomatic capture of AI system operations without manual interventionEU AI Act Article 12(1)
Period of UseStart and end time of each AI system useEU AI Act Article 12(3) (Annex III #1(a) systems only)
Reference DatabaseDatabase against which input data has been checkedEU AI Act Article 12(3) (Annex III #1(a) systems only)
Matched Input DataInput data for which search has led to matchEU AI Act Article 12(3) (Annex III #1(a) systems only)
Person VerificationIdentification of natural persons involved in verification of resultsEU AI Act Article 12(3) (Annex III #1(a) systems only)
Log RetentionPeriod for which logs must be kept (at least 6 months per Article 19(1))EU AI Act Article 19(1), Article 26(6)
Tamper-ProofLogs cannot be modified or deleted after creationThis Standard
Write-Once StorageStorage that allows writing once and reading many times (WORM)This Standard
Integrity VerificationProcess of verifying log integrity using cryptographic methodsThis Standard
Log AnalysisProcess of examining logs to identify patterns, anomalies, or issuesThis Standard
Competent AuthorityNational authority designated to supervise application of EU AI ActEU AI Act Article 3(48)

LINK WITH AI ACT AND ISO42001

12.1 EU AI Act Regulatory Mapping

This standard implements the following EU AI Act requirements:

EU AI Act ProvisionArticleRequirement SummaryImplemented By (Controls)
Record-KeepingArticle 12Automated logging of events over the lifetime of high-risk AI systemsAll controls (LOG-001 through LOG-005)
Automatic LoggingArticle 12(1)Automated logging of specified elementsLOG-001, LOG-002
Log RetentionArticle 19(1), Article 26(6)At least 6-month retention of logsLOG-003
Documentation AvailabilityArticle 53Logs available to competent authoritiesLOG-004, LOG-005

12.2 ISO/IEC 42001:2023 Alignment

This standard aligns with ISO/IEC 42001:2023 as follows:

ISO 42001 ClauseRequirementImplementation in This Standard
Clause 7.5: Documented informationMaintain documented informationLOG-001, LOG-002, LOG-003
Clause 7.5.3: Control of documented informationControl documented informationLOG-004
Clause 9.1: Monitoring, measurement, analysis, and evaluationMonitor and measure AI management system performanceLOG-005
Clause 9.2: Internal auditConduct internal auditsCompliance Section 5.2

12.3 Relationship to Other Standards

This logging and record keeping standard integrates with other AI Act standards:

Related StandardIntegration PointRationale
STD-AI-001: ClassificationClassification determines if logging requiredHigh-risk AI requires Article 12 logging
STD-AI-004: Technical DocumentationLogging configuration documented in Annex IVLogging infrastructure documented in technical documentation
STD-AI-013: Incident ManagementLogs used for incident investigationLog analysis supports incident management

12.4 References and Related Documents

EU AI Act (Regulation (EU) 2024/1689):

  • Article 12: Record-Keeping
  • Article 12(1): Automatic Logging
  • Article 19(1): Provider log retention (at least 6 months)
  • Article 26(6): Deployer log retention (at least 6 months)
  • Article 18(1): Technical documentation retention (10 years)
  • Article 53: Documentation Availability

ISO/IEC Standards:

  • ISO/IEC 42001:2023: Information technology — Artificial intelligence — Management system
  • ISO/IEC 27001:2022: Information security management systems
  • ISO/IEC 27035:2023: Information security incident management

Internal Documents:

  • POL-AI-001: Artificial Intelligence Policy (parent policy)
  • STD-AI-001: AI System Classification Standard
  • STD-AI-004: AI Technical Documentation Standard
  • STD-AI-013: AI Incident Management Standard
  • PROC-AI-LOG-001, -002: Logging procedures

APPROVAL AND AUTHORIZATION

RoleNameTitleSignatureDate
Prepared ByThomas WilsonIT Security Manager_________________________
Reviewed ByDavid LeeChief Technology Officer_________________________
Reviewed BySarah JohnsonAI Act Program Manager_________________________
Reviewed ByJane DoeChief Strategy & Risk Officer_________________________
Approved ByJane DoeAI Governance Committee Chair_________________________

Effective Date: 2025-08-01
Next Review Date: 2026-08-01
Review Frequency: Annually or upon regulatory change


END OF STANDARD STD-AI-005


This standard is a living document. Feedback and improvement suggestions should be directed to the IT Security Manager.

Standard Details

Standard ID

STD-AI-005

Version

1.0

Status

draft

Owner

IT Security

Effective Date

2025-08-01

Applicability

High-risk AI systems

EU AI Act References
Article 12
ISO 42001 Mapping
Clause 7.5Clause 9.1