v1.0
L2 StandardForward-looking
8.1 Conversation Integrity
8. Memory & Context Integrity — How do we protect agent memory?
Description
Conversation history MUST be protected from tampering.
Rationale
Attackers can manipulate history to make agents believe previous instructions were different.
Audit Procedure
1. Check how history is stored 2. Verify integrity protection 3. Test for history modification
Remediation
1. Hash or sign conversation entries 2. Validate chain integrity 3. Store in append-only logs
Framework Mappings
CIS Control 3.14NIST PR.DS-6