Conformance Levels
| Level | Requirements |
|---|---|
| AARM Core | R1–R6 (all MUST) |
| AARM Extended | R1–R9 (all MUST + SHOULD) |
Claiming Conformance
AARM is an open specification maintained by a community that has invested significant effort in defining rigorous, vendor-neutral requirements for securing AI-driven actions at runtime. To protect the integrity of that work and ensure that “AARM-conformant” carries real meaning, we ask that organizations claiming conformance agree to the following.Help shape the AARM system category definition
If your system is conformant, you agree to help shape and drive the AARM system category definition.
Engage with the AARM community
Be prepared to participate in the AARM Technical Working Group, conformance discussions, or related community activities. Claiming conformance is not a one-way assertion. It comes with an expectation of engagement with the community that maintains the specification. This ensures that conformance claims are grounded in real implementation experience, that feedback flows back into the specification, and that the broader ecosystem benefits.
Operate a production system with active customers
Conformance claims should be backed by a working, production-deployed solution that is actively used by customers. AARM conformance describes the runtime behavior of a live system, not a design document or a roadmap.
Hold a recognized security certification
The organization claiming conformance should hold at least one recognized security certification (e.g., SOC 2 Type II, ISO 27001, FedRAMP) relevant to the environment in which the AARM system operates. This establishes baseline organizational security maturity and provides independent assurance that the system is operated within a controlled security program.
Participate in future benchmarking
AARM will publish comparable benchmarks to measure policy detection and enforcement metrics across conformant systems, giving buyers objective data to evaluate which tools are most effective for their needs. By claiming conformance, you agree to actively participate in those benchmarking efforts when they become available.
Required (MUST)
R1: Pre-Execution Interception
The system MUST intercept actions before execution and be capable of blocking or deferring based on policy evaluation.R2: Context Accumulation
The system MUST accumulate session context across actions within a session.R3: Policy Evaluation with Intent Alignment
The system MUST evaluate actions against both static policy and contextual intent alignment.- A policy rule’s match predicate references context fields not yet populated in the session
- Multiple applicable policies produce conflicting decisions at the same priority level
- A confidence score (if implemented) falls below a deployment-configured threshold
R4: Authorization Decisions
The system MUST support five authorization decisions: ALLOW, DENY, MODIFY, STEP_UP, and DEFER.| Decision | Behavior |
|---|---|
| ALLOW | Action proceeds unchanged |
| DENY | Action blocked, no effects occur |
| MODIFY | Action proceeds with transformed parameters |
| STEP_UP | Action paused pending human approval |
| DEFER | Action temporarily suspended due to insufficient, ambiguous, or conflicting context |
R5: Tamper-Evident Receipts
The system MUST generate cryptographically signed receipts for all actions. Receipts MUST contain:R6: Identity Binding
The system MUST bind actions to identities at multiple levels:Recommended (SHOULD)
R7: Semantic Distance Tracking
The system SHOULD compute semantic distance between actions and stated intent to detect intent drift. Given the original request r₀ and the current action aₙ, semantic distance can be computed via embedding similarity:R8: Telemetry Export
The system SHOULD export structured telemetry to security platforms.R9: Least Privilege Enforcement
The system SHOULD support credential scoping for minimal permissions per action.Summary Table
| ID | Level | Requirement |
|---|---|---|
| R1 | MUST | Pre-execution interception: block or defer actions before execution |
| R2 | MUST | Context accumulation: track prior actions, data classifications, original request |
| R3 | MUST | Policy evaluation with intent alignment: forbidden, context-dependent deny/allow/defer |
| R4 | MUST | Five authorization decisions: ALLOW, DENY, MODIFY, STEP_UP, DEFER |
| R5 | MUST | Tamper-evident receipts: cryptographically signed with full context |
| R6 | MUST | Identity binding: human, service, agent, session, and role/privilege scope |
| R7 | SHOULD | Semantic distance tracking: detect intent drift via embedding similarity |
| R8 | SHOULD | Telemetry export: structured events to SIEM/SOAR platforms |
| R9 | SHOULD | Least privilege enforcement: scoped, just-in-time credentials |