v1.0
L2 StandardAutomated verification
7.4 Communication Logging
7. Agent-to-Agent Security — How do agents trust each other?
Description
All agent-to-agent communication MUST be logged.
Rationale
Logs enable detection of anomalous communication and forensic analysis.
Audit Procedure
1. Check if A2A communications are logged 2. Verify logs include required fields 3. Check log retention
Remediation
1. Log all A2A communications 2. Use structured logging 3. Send to centralized SIEM
Framework Mappings
CIS Control 8.2NIST DE.CM-1