From AI Assurance to Cyber Assurance: ADIC and the Re-verification of Execution Permissions
- kanna qed
- 3 日前
- 読了時間: 6分
1. Introduction: AI Shifting from "Decision-Making" to "Execution"
The rapid evolution of Artificial Intelligence (AI), particularly Large Language Models (LLMs) and autonomous AI agents, is fundamentally reshaping the human-system interface. Traditionally, AI has been confined to cognitive decision support—providing suggestions, generating text, or analyzing data to deliver recommendations to human operators. Today, however, AI is entering the execution pathway. It now initiates direct state transitions within target environments by invoking APIs, modifying cloud configurations, deploying code, and altering access control permissions.
This shift challenges the core assumptions of traditional security models and auditing frameworks. In an era where autonomous agents operate directly within execution loops, the central verification challenge undergoes a paradigm shift: we must verify not only the cognitive provenance of an AI's decision but also whether the resulting state mutations comply with invariant safety policies. Crucially, these execution permissions must be auditably re-verifiable after the fact.
This article explores how "AI Assurance"—the framework for verifying AI decision-making—must naturally extend to "Cyber Assurance" to validate the legitimacy of real-world state transitions. Furthermore, we examine the verification structures implemented by ADIC (Advanced Data Integrity by Ledger of Computation) to realize this paradigm.

2. The Role of AI Assurance: Archiving Verifiable Decision Provenance
The primary mandate of AI Assurance is to demystify the black-box nature of AI decision-making, rendering the underlying reasoning processes auditable. This is achieved by systematically archiving metadata and evidence to allow independent, post-hoc verification:
Contextual Hermeticity: Freezing the precise input context, including the datasets, documents, and reference materials utilized by the AI at the exact moment of inference.
Metric and Threshold Compliance: Documenting that the inference process conformed to specified risk classification rules and policy thresholds.
Human-in-the-Loop Provenance: Recording the cryptographically bound approvals and authorizations granted by specific roles during the decision process.
Within the ADIC architecture, these decision-making artifacts are not merely captured as loose, natural-language "explanations." Instead, they are modeled as structured, typed evidence packages (DecisionPackage and ApprovalSubject). These packages are designed for consistent interpretation and re-execution by downstream verifiers, and are committed to an immutable ledger using cryptographic digests (Digest). Through this formalization, AI decision-making is transformed into a concrete, auditable data structure.
3. The Gap: Why Verifiable Decisions Alone Cannot Guarantee System Integrity
While establishing a verifiable decision-making trail is necessary, it is insufficient to guarantee operational security. A fundamental logical boundary must exist between an agent's output—which asserts that a given action should be taken—and the system's execution gate, which determines whether that action is allowed to run.
State-mutating operations must be bound by system-wide invariants that remain independent of the perceived correctness of any individual AI recommendation. Such operations include:
Privilege Modification: Granting or escalating access rights (e.g., via grant_write).
Protected Resource Alteration: Deleting or modifying audit logs, configurations, or system ledgers (e.g., via delete_resource).
Data Exfiltration: Transferring sensitive payloads across network boundaries (e.g., via export_external).
Security Control Disabling: Bypassing or suspending active gateways (e.g., via disable_gateway).
Even if AI Assurance can prove that an agent decided to delete a database in accordance with high-level diagnostic policies, executing that request without independently verifying its compliance with system boundaries introduces vulnerability.
When the verification of decisions is decoupled from the verification of execution permissions, the system risks unauthorized legitimacy shifts. To safely bridge autonomous recommendations to actual system execution, we must introduce a separate, dedicated layer: Cyber Assurance.
4. Defining Cyber Assurance: Re-Verifying State Mutations Post-Hoc
Within the ADIC framework, Cyber Assurance is defined as follows:
"A rigorous accountability structure and technical mechanism that enables post-hoc re-verification of who authorized an execution request, under what conditions, based on what evidence, and within what permitted boundary of impact, by correlating the request with the actual state transitions before and after execution."
This paradigm complements traditional security practices:
Perimeter Defense and Active Detection: Firewalls, Intrusion Detection Systems (IDS), and Web Application Firewalls (WAF) are designed to block external anomalies. They cannot adequately constrain anomalous or malicious actions initiated by an internal AI agent operating with legitimate credentials.
Audit Logging: Conventional logging mechanisms (such as syslog or SIEM) record that an event occurred, but they cannot easily guarantee log integrity over time, nor can they retroactively prove why a specific state mutation was permitted under historical policy states.
Cyber Assurance (ADIC): Binds the pre-execution state, post-execution state, and approved permission boundaries via immutable cryptographic hash links, allowing their logical consistency to be audited and re-executed at any point in the future.
Cyber Assurance is not a passive monitor; it is a dynamic, invariant-preserving framework that establishes a continuous chain of custody for every state mutation within the system.
5. The ADIC Architecture: Merging Decision and Execution on a Unified Ledger
ADIC bridges the gap between decision and execution by integrating both AI Assurance and Cyber Assurance into a single, unified evidence ledger.
When an agent or human operator requests a system mutation, the ADIC Gateway enforces a deterministic, transactional pipeline:
[Operation Request (OperationRequest)]
│
▼
[Evaluate Impact Bounds (EffectBound / phi)] ── Over-approximates actual system mutations (Diff)
│
▼
[Determine Risk Class (RiskClass)] ── Evaluates risk based on over-approximated bounds
│
▼
[Determine Approval Requirements (ApprovalPolicy)] ── Dictates the required cryptographic signature roles
│
▼
[Pre-Commit Registration (Pre-commit)] ── Records pre-state, expected effects, and approval evidence
│
▼
[System Execution (Execution)] ── Applies the state mutation to the underlying environment
│
▼
[Post-Commit Registration (Post-commit)] ── Records post-state, execution outcome, and hash-links
Under this model, the gateway never executes a task solely because an AI agent generated it, nor does it yield execution paths based purely on transient runtime approvals. An operation only achieves final execution permission (Post-commit on the ledger) if the pre-execution state, active security policies, operational request parameters, pre-evaluated impact bounds ($\phi$), and collected cryptographic approvals align under verification. This design chains the cognitive decision inputs to the system outputs in an unbroken, auditable sequence.
6. Replay-Oriented Verification: The Logical Underpinning of Execution Assurance
To ensure the logical consistency of these execution permissions, ADIC uses a replay-oriented verification structure. This framework establishes that ADIC's verification claims are grounded in a verifiable state-transition system.
At the core of this verification structure is the principle of non-circularity: the system does not assume the validity of an operation based on the assertion that a valid permit exists. Instead, the proof of legitimate execution (the "Witness") must be reconstructed post-hoc from the ledger records.
This replay-oriented verification structure demonstrates several key properties:
Non-Circular Evidence Reconstruction: The ledger's commit state (CommittedByLedger) is defined strictly through observable ledger records (hash chains and state digests). The execution witness can be dynamically reconstructed from these immutable records, enabling reproducible playback of historical state mutations.
Safety Boundary Envelopment: For any verified execution witness, the actual system mutation ($Eff$) is bounded by the pre-evaluated and approved safety envelope ($\phi$). Unapproved "drifts" in safety or authorization state are prevented.
State Invariance of Rejected Operations: Any operational step that fails validation (RejectedStep) leaves the protected state space ($IsProtected$) unmodified.
Decoupling of Generation and Permission: Automated requests that are generated by an AI agent, but lack the corresponding cryptographic approvals or violate policy thresholds, are barred from passing the core authorization logic.
In the internal engineering of the ADIC gateway, this replay-oriented verification is further validated using Lean 4 formal specifications. By proving these theorems against the gateway's state-machine model, ADIC shows how the boundary between "agent generation" and "system execution permission" can remain logically separated and auditable.
7. Industrial Implications: The Need for Evidence of Execution
Cyber Assurance becomes increasingly important for deploying autonomous systems in high-responsibility and highly regulated environments:
Financial Operations and Ledger Integrity When autonomous agents assist in underwriting, credit evaluation, or large-scale asset movement, resolving discrepancies is difficult if the agent's reasoning (AI Assurance) is disconnected from the ledger transaction gates (Cyber Assurance). ADIC ensures that the system state change is cryptographically tied to the verified decision criteria.
Clinical and Healthcare Data Integrity In medical configuration systems or clinical trial databases, AI-driven recommendations for patient data updates present safety risks unless every state change is bound to the exact medical evidence and credentialed clinician signatures that authorized it.
Autonomous Industrial Automation As AI agents dynamically tune parameters in automated logistics or manufacturing facilities, operators must have the capability to prove that all executed parameter mutations remained within pre-approved safety envelopes ($\phi$), preventing physical damage or operational drift.
In these critical domains, flat, text-based log files are no longer sufficient to serve as audit records. Organizations require a framework that preserves the exact state of the system, the corresponding policy state, and the authorization envelope in a format that can be independently re-executed and verified.
8. Conclusion: Moving Beyond Explanations
AI Assurance has established important benchmarks by making AI's cognitive processes explainable and auditable. However, as AI transitions from a passive advisor to an active agent capable of initiating state mutations in the physical and digital worlds, analyzing decision-making in isolation is no longer sufficient.
The next frontier is Cyber Assurance: a robust framework for verifying that the downstream actions resulting from AI decisions comply with system invariants.
ADIC (Advanced Data Integrity by Ledger of Computation) bridges these two domains, providing a unified ledger architecture where "verifiable decision evidence" and "execution permission verification" are bound together. As autonomous agents become deeply integrated into various environments, systems will be evaluated not just on what their AI agents recommended, but on why the system permitted those actions to run. ADIC provides a ledger-based verification structure for answering that question with reproducible evidence.



コメント