Featured image for the Audit-Ready Agentic Approvals article: AI agent evidence chain and authority controls.

Audit-Ready Agentic Approvals: Evidence, Controls, and "As-Of" Authority for AI

What audit-readiness means for AI agents, what evidence one sampled action requires, and why as-of authority is the hardest question: a GRC and audit Q&A on agentic approvals.

Definition: Audit-ready agentic approvals are AI-driven decisions structured so that, for any sampled action, an organization can produce a complete evidence bundle: the authority record that authorized the agent, the rule that applied, the approval (if required), the execution log, and the exception handling. Reconstruction after the fact is not the same as audit-ready.

An auditor sampling an agent's action does not ask the agent how it reasoned. The auditor asks the same five questions used in human delegation-of-authority audits: who had authority, what were the limits, what approvals were required, what action was executed, and how were exceptions handled. The audit-readiness problem for agentic workflows is therefore not a model-explainability problem. It is an evidence and authority problem, and most of the answer already lives in the discipline of delegation of authority.

The stakes are confirmed by recent data. SailPoint's 2025 AI Agents survey found that 80% of organizations using AI agents have experienced unintended actions attributable to an agent. Gartner projects that more than 40% of agentic AI projects will be canceled by the end of 2027 due to escalating costs, unclear value, or inadequate risk controls. And the ACFE's 2024 Report to the Nations, based on 1,921 occupational fraud cases across 138 countries, found that the typical occupational fraud lasts 12 months before detection and produces a median loss of $145,000 per case. The longer the gap between action and audit, the more expensive evidence reconstruction becomes. The pattern carries over to agentic actions: evidence captured at the time of an action is decisively easier to defend than evidence assembled after the fact.

This Q&A answers the operative questions a GRC leader, internal auditor, or external auditor will ask about an organization's agentic approval program: what audit-ready actually means, what evidence is required for one sampled action, why as-of authority is the hardest question, how sampling works, how long evidence has to be retained, and how to design approvals that scale without abandoning control. For the governance frame underneath this article, see Agentic Authority Management. For the accountability frame, see Human Accountability in Agentic Workflows.

Split-panel diagram contrasting reactive evidence reconstruction with proactive evidence capture for AI agent audits.

What does "audit-ready" mean for an AI agent's actions?

Audit-ready means that for any sampled agent action, you can produce a complete evidence bundle within audit timelines: the authority record, the rule applied, the approval (if required), the execution log, and exception handling. Audit-readiness is binary at the action level.

For one sampled action, an auditor expects to receive a coherent evidence package within 48 to 72 hours. The package answers five questions, each of which is answerable independently in a mature program:

  1. Who had authority? The delegation record showing the agent's scope, effective dates, accountable human owner, and conditions.
  2. What were the limits at the time? The version of the authority matrix, taxonomy, or policy that applied on the action date.
  3. What approvals were required? The decision rule that governed this transaction type and threshold.
  4. What action was executed? The execution log from the system of record (ERP, treasury platform, contract system) showing identity, timestamp, and counterparty.
  5. What monitoring existed? The exception report (if any), the resolution record, and the escalation trail.

Audit-readiness is binary at the action level. You can either answer all five questions for a sampled action or you cannot. There is no partial credit. Programs that score well on the first four questions and fail on the fifth produce findings; programs that fail on the first three produce material weaknesses.

The cost of getting this wrong is well-documented. ACFE 2024 data shows that 51% of occupational fraud cases involved either the absence of internal controls (32%) or the override of existing controls (19%). Both failure modes create exactly the audit-readiness gap this section describes: missing or non-defensible evidence at the action level. For the broader connection between authority programs and SOX-relevant control evidence, see DOA and SOX/Internal Controls.

Why is auditing AI agents fundamentally a delegation-of-authority problem?

Auditing agents is not a model-explainability problem. It is an authority and evidence problem, identical in structure to the human delegation audits enterprises have run for fifty years. The right framework is already on the shelf.

Two framings compete for how organizations think about agentic audits. The first asks: can we explain what the model did? This framing is seductive because the technology is new, but it leads to dead ends. Modern agentic systems are non-deterministic, and reconstructing internal reasoning is neither feasible nor what auditors actually want.

The second framing asks: was the actor authorized, and did the controls operate? This is the framing used for human approvals for fifty years, codified in Sarbanes-Oxley Sections 302 and 404, embedded in PCAOB standards, and replicated in the audit programs of every major external auditor. It works for humans, and it works for agents, because it audits the system around the actor rather than the actor's cognition.

Definition: Authority evidence framework is the audit approach that examines whether an actor was authorized to take a specific action and whether the surrounding controls operated as designed. It evaluates the system around the decision rather than the decision-maker's reasoning.

The regulatory direction of travel confirms this framing. The EU AI Act Article 12 mandates record-keeping for high-risk AI systems, focused on operational logs rather than reasoning explanations. The OWASP Top 10 for LLM Applications 2025 elevated Excessive Agency to LLM06, framing the risk as ambiguous or excessive authority rather than opaque reasoning. And Deloitte's State of AI in the Enterprise 2026 reports that only 21% of organizations have mature agentic AI governance, with the maturity gap concentrated in authority and evidence practices, not model explanation.

For organizations that already run a mature DOA program, the work is extension rather than invention. The authority matrix extends to agent actors. The DOA policy extends to agent grants. The audit chain is the same chain, with one new actor type added.

What is the control stack for audit-ready agentic approvals?

The control stack has six layers: authority grant, preconditions, approval capture, execution evidence, monitoring and exception handling, and periodic recertification. Missing any layer forces reconstruction at audit time, and reconstruction is the most expensive evidence to produce.

A control stack is the layered set of preventive and detective controls that together produce audit-ready evidence for a class of actions. For agentic approvals, six layers are required, and each layer has a specific evidence output that auditors will look for. Skipping any layer does not eliminate the audit question. It only means that when the question is asked, the answer has to be reconstructed from primary records that were not designed to answer it.

Control LayerPurposeEvidence ProducedCommon GapAptly Capability
1. Authority grantControlled delegation to the agent: scope, limits, conditions, accountable owner, effective dates.Versioned delegation record with effective and expiration dates.Grants documented informally on a wiki page or in email, without versioning or expiry.Versioned delegation records with effective dates, conditions, and accountable owner.
2. PreconditionsRules that must be satisfied before the agent executes: legal review, budget check, segregation-of-duties, watch-list screening.Precondition check log with rule reference and pass/fail outcome.Preconditions exist in policy but are not enforced in the workflow at runtime.Runtime condition evaluation with logged decision records.
3. Approval captureRecord of human approvals when the action requires one (out-of-bounds, exception, threshold-breaching).Approval record with approver identity, timestamp, and rule reference.Approval captured but missing the rule reference; orphan approvals.Required rule reference field on every approval record.
4. Execution evidenceSystem logs showing the action that was actually taken in the system of execution.Transaction log from the ERP, treasury, CLM, or procurement system.Execution logs exist but are not linked to the authority record by stable identifier.Integration with downstream systems so execution logs link by stable identifier.
5. Monitoring and exception handlingDetection and response for out-of-band agent behavior or rule breaches.Exception report with named approver, resolution, and formal closure.Monitoring exists but exceptions are resolved informally and never formally closed.Exceptions opened, escalated, and closed in the same record.
6. Periodic recertificationScheduled review and explicit renewal or revocation of the agent grant by the accountable owner.Recertification record with owner attestation, date, and decision (renew, revise, revoke).No recertification cadence defined; grants persist indefinitely without review.Cadence-driven recertification reminders with auto-expiry on lapse.

The most underbuilt layer in current agentic deployments is the first. EY and the Society for Corporate Governance's 2025 survey of 222 companies found that almost 90% maintain a delegation of authority policy, yet only 14% embed that policy in a dedicated IT system for tracking and enforcement. For agent grants, that gap widens. Most organizations document agent authority informally (a wiki page, a slide in a deployment review, an email approval) and then expect that informal documentation to function as the authority record at audit time. It does not.

The sixth layer, periodic recertification, is the layer most often missed entirely. An agent grant that was appropriate at deployment may not be appropriate six months later, after model updates, scope drift, or organizational change. Recertification on a defined cadence is the control that catches authority drift before it becomes an audit finding. For the broader operating model that holds these layers together, see the Operating Model for Authority Management.

What does an audit-evidence package for a single agent action look like?

A complete evidence package for one agent action contains five elements: transaction details, the approval record, the authority rule that applied, as-of authority proof, and exception documentation. Missing any one of the five breaks the audit chain.

Consider a worked example. On April 14, 2026, a procurement agent renews a SaaS vendor contract for $48,000. On June 3, an external auditor samples this transaction in Q2 testing and asks for the supporting evidence. What can the organization produce within 48 hours?

A mature program produces a five-element package. An immature program produces what it has and reconstructs the rest. The cost difference is roughly two orders of magnitude. West Monroe's 2026 Speed Wins research, based on a survey of 1,000 managers and 214 C-suite executives, found that each additional analysis request adds an average of three weeks of delay. For audits, those three weeks are billable hours, deferred close, and accumulating risk on the work paper.

Evidence ElementWhat It ContainsWhere It LivesCommon GapRisk if Missing
1. Transaction detailsAction type, amount, counterparty, date, system of execution, and the agent identity that performed it.System of execution (ERP, treasury, CLM, procurement).Agent identity not captured or captured as a generic service account.Cannot trace transaction back to the specific agent.
2. Approval recordIf a human approval was required: approver identity, approval timestamp, and explicit rule reference.Authority system of record or workflow platform.Approval captured by email or chat without rule reference.Cannot prove the approval applied to this specific transaction type and threshold.
3. Authority rule referenceThe decision rule that governed this transaction type and threshold, including the rule version that was active.Authority matrix or DOA policy with version history.Rule documented in policy but not versioned; no link from rule to the specific transaction.Cannot demonstrate the agent acted under the applicable rule version.
4. As-of authority proofThe delegation record state on the action date: scope, limits, accountable owner, effective and expiration dates.Authority system of record with point-in-time recall.Only current-state authority record retained; historical state overwritten.Cannot answer the most decisive audit question: did the actor have valid authority on that date?
5. Exception documentationAny exception flag raised, the named approver who handled it, and the formal resolution record.Authority system of record or GRC platform.Exceptions handled informally; no formal closure record.Auditors interpret undocumented exceptions as control gaps regardless of business outcome.
Audit evidence package flow showing five elements auditors need for AI agent actions with high-risk gaps highlighted.

Each element must reference the others by stable identifier. The transaction record references the approval record by approval ID. The approval record references the authority rule by rule ID and version. The rule references the delegation record by delegation ID. The delegation record references the accountable human owner by employee ID. Without these stable identifiers, the chain has to be reassembled by hand for every audit, every quarter, for every sampled action.

Definition: Evidence chain is the linked set of records (transaction, approval, rule, delegation, accountable owner) that together prove an authorized action took place under operating controls. The chain is only as strong as its weakest link.

For the accountable human side of the chain, see Human Accountability in Agentic Workflows. For the signatory governance side, see Authorized Signatory Lists Explained.

Why is "as-of authority" still the hardest audit question for AI agents?

As-of authority is hard because it requires reconstructing what the agent was authorized to do on a specific past date. Without versioned delegation records and explicit effective dates, that reconstruction is not possible at any cost.

Continue the worked example. The auditor samples the April 14 vendor renewal in June. The decisive question is not does the agent currently have $48K authority? It is did the agent have $48K authority on April 14? Most organizations cannot answer the second question, because the only authority record they keep is the current one. The April 14 state has been overwritten.

Definition: As-of authority reconstruction is the audit task of proving what authority an actor (human or agent) held on a specific historical date. It requires versioned authority records with explicit effective and expiration dates, retained for the full audit lookback period.

Three failure modes account for almost every as-of authority audit finding. Each has a specific root cause and a specific fix.

Failure ModeWhy It Breaks AuditWhat Auditors Will FindRequired Fix
Delegation without effective datesThe grant has no documented start or end date, so historical applicability cannot be established for any past transaction.A delegation record with the agent name and scope but no date fields. Auditor cannot confirm authority on the transaction date.Make effective and expiration dates required fields on every delegation. Backfill missing dates from grant approval records.
Delegation without versioningThe current state of the record is the only state retained. Edits overwrite history, so the as-of state cannot be reconstructed.The current record shows scope X, but the transaction in question was approved when scope was Y. No record of Y exists.Implement immutable, versioned records with point-in-time recall. Every change creates a new version; prior versions are retained.
Temporary authority without expiryA grant intended for a specific window persists indefinitely, so transactions executed after the intended window appear authorized when they were not.An "interim" or "pilot" delegation that has been active for two years with no review, no expiry, and no revocation record.Require explicit expiry on temporary authority. Auto-expire grants that lapse the recertification cadence without renewal.

The data underscores how widespread the gap is. The same EY/SCG survey found that almost 90% of companies maintain a delegation of authority policy, yet only 14% embed it in a dedicated IT system. The 76-point gap between policy and system embedment is precisely where as-of reconstruction fails. A policy document does not preserve historical state. A point-in-time recall capability does.

Timeline of the as-of authority question: agent acts on date X, auditor samples on date Y, versioned record proves authority.

For agentic workflows, the as-of question is structurally identical to the human version, but it surfaces faster because agent volumes are higher. A human approver may sign 200 transactions a year. An agent may execute 200 a day. The same as-of authority question, asked across that volume, makes manual reconstruction unaffordable. For the related discipline of preventing the underlying records from drifting in the first place, see Avoiding Sync Drift Between Authority Systems.

Our recommendation: implement immutable, versioned delegation records for agents from day one, including pilot phases. The most expensive audit finding is not "the agent exceeded its authority." It is "we cannot prove what authority the agent had at the time of the action." Retroactive evidence construction costs orders of magnitude more than proactive record-keeping, and the cost only compounds as agent volume scales.

How do you sample agent actions for audit testing?

Sample agent actions the same way auditors sample human approvals: risk-stratified, threshold-stratified, and exception-flagged. The viability of any sampling method depends on the authority record being indexed by agent identity and decision type.

Auditors do not test every transaction. They sample. For agent actions, the sampling method is the same one used for human approvals, with adjustments for volume. A practical sampling program draws from four strata, each with its own selection logic and evidence requirement.

Sampling StratumSelection CriteriaSample Size GuidanceEvidence Required Per Sample
High-value transactionsActions over a defined materiality threshold (typically the SOX scoping threshold for financial actions).100% review for actions above the threshold; do not sample at the high tier.Full five-element evidence package, plus accountable owner attestation.
Threshold-boundary transactionsActions within a defined band below the agent's hard authority limit (the band where threshold-stacking risk concentrates).Risk-based sample (typically 25 to 60 transactions per testing period).Full five-element evidence package; pattern analysis across the band.
Exception-flagged transactionsEvery action that triggered an exception flag (out-of-bounds, watch-list match, segregation-of-duties hit).100% review; exceptions are not sampled.Full five-element evidence package, plus exception record with formal closure.
Routine populationThe remaining body of within-bounds, sub-threshold actions that constitute normal operating volume.Statistical sample (typically 25 to 40 transactions per testing period using attribute sampling).Five-element package with focus on element 4 (as-of authority proof).

Sampling efficacy depends on a single underlying condition: the authority record has to be indexed by agent identity and by decision type. If the record exists only as a flat list of human delegations with agents appended in a notes column, sampling collapses into manual searching. If the record is properly indexed, sampling completes in a query.

Gartner's projection that more than 40% of agentic AI projects will be canceled by the end of 2027 attributes the cancellations to inadequate risk controls and unclear value. Sampling is one of the controls being cited. A program that cannot demonstrate proactive sampling against a documented methodology cannot satisfy an internal audit committee, an external auditor, or a regulator who asks for the evidence behind the assertion that the agent operates within bounds.

For the metric set that supports ongoing sample-based monitoring, see Authority Monitoring and Reporting Metrics.

How long should agent approval evidence be retained?

Apply the same retention rules used for human approval evidence: SOX 7 years for financial transactions, longer for regulated industries. Storage cost is trivial compared to reconstruction cost, so default to retaining everything for the longest applicable period.

Retention requirements for agent evidence are not new. They are the same retention requirements that already apply to the human equivalents of those actions, and the same statutes and regulations govern both.

Definition: Evidence retention is the discipline of preserving authority records, approvals, execution logs, and exception documentation for the duration required by applicable law, regulation, or contract. The retention clock typically starts at the date of the action, not the date the record was created.

The most common retention floors:

For agent actions, retain the full evidence chain (delegation record version, rule version, approval record, execution log, exception documentation) for the longest applicable period among the action types the agent touches. If a procurement agent occasionally executes SOX-relevant transactions and occasionally executes routine OpEx, retain the full chain for seven years for the entire population. The cost difference between retaining for seven years versus three is negligible. The cost difference between having the evidence and not having it is total.

The point-in-time recall requirement also applies to retention. It is not enough to retain the records. The records have to be recallable in their as-of state. A delegation record retained as the current state in 2033, with no version history showing the 2026 state, satisfies the storage requirement and fails the audit requirement.

How do you design agent approvals that scale without abandoning control?

Move from approval-of-every-action to approval-of-authority-grants, approval-of-exceptions, and periodic recertification. This pattern preserves audit defensibility while letting the agent operate at speed.

If a human has to approve every agent action, the agent provides no leverage. Most organizations therefore move to a three-pattern model that retains audit defensibility without sitting in the approval path of every transaction.

Approval at the grant level. The decision an organization actually controls is who can operate the agent and within what bounds. That decision is reviewed and approved at the time of grant, with formal documentation, and re-approved on a defined cadence. Once the grant is in place, the agent operates within bounds without per-action human approval.

Approval at the exception level. When an agent encounters an action outside its bounded authority (a transaction over threshold, a counterparty on a watch list, a category not in scope), the action escalates to a named human approver. The exception path is the only place humans sit in the real-time approval flow. Designed correctly, exception volume is small enough to handle without becoming a bottleneck.

Periodic recertification. On a defined cadence (typically quarterly for high-risk agents, semi-annually for medium, annually for low), the accountable human owner reviews the agent's activity, confirms the delegated authority is still appropriate, and renews or revokes the grant. Recertification is the control that catches drift between deployment-time intent and current-state behavior.

Definition: Periodic recertification is the scheduled review and explicit renewal (or revocation) of an authority grant by the accountable owner. Recertification is the discipline that prevents authority records from quietly aging into invalidity.

The business case for getting this design right is large. West Monroe's 2026 research found that 73% of leaders estimate their organizations lose up to 5% of annual revenue to slow decision-making and delayed execution: revenue lost to missed opportunities, stalled initiatives, and lost momentum. Well-designed agent approvals are one mechanism for closing that gap. APQC's 2024 research on DOA effectiveness, based on a survey of 311 finance professionals, found that organizations with effective delegation report 62% higher productivity, 53% higher organizational agility, and 49% reduction in bottlenecks. The same pattern applies to well-bounded agent authority.

Our recommendation: design the exception path before deploying the agent. Most agent governance failures we see are not failures of the bounded operating mode. They are failures of the exception path: an exception arrives, no human is named to handle it, the exception gets routed to whoever is nearest, and the resulting approval has no rule reference, no audit trail, and no defensible evidence position. Naming the exception approver in the delegation record itself prevents this failure mode entirely. For the change-management practice that supports this discipline, see the Authority Change Management Playbook.

How does Aptly support audit-ready agentic approvals?

Aptly is the authority system of record for both human and agent actors. It maintains versioned delegation records, point-in-time recall, the evidence chain, and the runtime decisions that audit-ready agentic approvals require.

Aptly's Authority Hub maps to each layer of the control stack described above:

Point-in-time recall is the underlying capability that makes as-of authority answerable. Any delegation record can be queried for its state on any past date within the retention window. The five-element evidence package becomes a single query rather than a multi-day reconstruction project. For the broader Aptly platform context, see the Authority Hub and the single source of truth pattern that underpins it.

Frequently asked questions

How do you audit an AI agent's decision when the reasoning is non-deterministic?

You do not audit the reasoning. You audit the authority and evidence chain: was the agent authorized, were preconditions met, was the action within delegated limits, and was the outcome recorded? This is the same framework auditors use for human decisions.

For human approvers, auditors do not reconstruct the approver's thought process. They verify that the approver had authority, the approval was within scope, and the evidence trail is complete. The same logic applies to agents. Non-determinism in the reasoning is irrelevant to the audit if the authority and evidence chain is intact. The doctrine underneath this approach is articulated in the Restatement (Third) of Agency, which has been the operative framework for principal-agent audits for two decades.

What regulatory frameworks specifically require audit trails for AI decisions?

The EU AI Act (Articles 12 and 14), SOX Sections 302 and 404, MiFID II, NIST AI RMF, and ISO/IEC 42001:2023 all require audit-evidentiary practices for AI-driven decisions. The frameworks differ in scope but converge on the same evidence requirements.

The EU AI Act Article 14 requires effective human oversight for high-risk AI, and Article 12 mandates record-keeping. Sarbanes-Oxley Sections 302 and 404 require effective internal controls over financial reporting, which extends to any agent executing financial transactions. NIST AI Risk Management Framework 1.0 embeds accountability and oversight as governance requirements. ISO/IEC 42001:2023 provides a certifiable AI management system standard. MiFID II and APRA CPS 510 add jurisdiction-specific requirements for financial services.

What happens at audit if an agent acts outside its delegated authority?

The exception itself is not the audit failure. The audit failure is the absence of documented detection, escalation, and resolution. A logged exception with a clear resolution trail is a control operating as designed. An undocumented exception is a control gap.

Auditors expect exceptions. They do not expect undocumented exceptions. A program that catches an out-of-bounds agent action, escalates it to a named approver, documents the resolution, and updates the authority record (or the agent's scope) is a program where the controls operated. A program that has no record of the exception, or that resolved it informally, has a material control gap regardless of whether the underlying business outcome was acceptable.

How do you produce evidence for an agent action where the system of execution is a third-party SaaS?

Combine three sources: the third-party system's API audit log, the third-party SOC 2 or equivalent control attestation, and the internal authority record. The internal record provides the authorization; the third-party log and attestation provide the execution evidence.

For SaaS-executed actions (a CLM platform signing a contract, a treasury platform initiating a payment, a procurement platform issuing a purchase order), the execution log lives in the vendor's system. Auditors accept third-party logs paired with the vendor's SOC 2 Type II report (or equivalent) as evidence of the control environment around the log. The internal authority record completes the chain by establishing that the agent was authorized to invoke the third-party action in the first place.

Who is the appropriate signing officer for an agent's approval evidence?

The accountable human owner named in the delegation record. SOX certifying officers (CEO and CFO) certify the control environment that bounded the agent, but the named accountable owner certifies the specific authority and activity record on a defined cadence.

The two-tier model parallels the human approver case. CEOs and CFOs certify the control environment under SOX Section 302, including the control environment around agent actions. The accountable human owner named in the delegation record (typically a process owner: head of procurement operations, treasurer, head of customer operations) certifies the agent-specific authority and activity records. Both certifications are required for a complete control framework. For the broader treatment of accountable ownership, see Human Accountability in Agentic Workflows.

Can agentic approvals satisfy SOX internal control requirements?

Yes, provided the control framework meets the same evidence standard as human approvals: documented authority grants, versioned delegation records with effective dates, captured approvals with identity and timestamps, and exception handling with formal resolution.

The key is demonstrating that the agent operated within a controlled framework, not that a human reviewed every individual transaction. PCAOB AS 2201 (the standard governing auditor evaluation of internal controls over financial reporting) does not require human-in-the-loop on every transaction. It requires that the control environment, including the controls around any actor (human or agent) executing inside it, operates effectively. A well-designed agent control stack satisfies this requirement.

What is the minimum control set required before an agent can execute SOX-relevant transactions?

Six controls: a versioned delegation record naming an accountable human owner, scoped authority with effective dates, automated precondition enforcement, approval capture with rule reference, execution log linked to the authority record, and exception handling with formal closure. Without all six, the agent should not be in the SOX scope.

The six controls map directly to the six layers of the control stack in this article. Organizations sometimes attempt to deploy an agent into a SOX-relevant process with only the first three controls in place, planning to add the rest later. The result is a SOX-relevant action with non-defensible evidence, which is a control deficiency on the day the agent first acts. Deploy with all six or do not deploy into SOX scope.

Sources

  1. SailPoint and Dimensional Research. "AI Agents: The New Attack Surface." May 2025.
  2. Gartner. "Gartner Predicts Over 40% of Agentic AI Projects Will Be Canceled by End of 2027." June 2025.
  3. Association of Certified Fraud Examiners. "Occupational Fraud 2024: A Report to the Nations." March 2024. Based on 1,921 cases investigated between January 2022 and September 2023 across 138 countries and 22 industries.
  4. U.S. Congress. "Sarbanes-Oxley Act of 2002, Sections 302, 404, and 802." July 2002.
  5. OWASP Foundation. "OWASP Top 10 for LLM Applications 2025." 2025.
  6. OWASP Foundation. "LLM06:2025 Excessive Agency." 2025.
  7. Deloitte. "State of AI in the Enterprise 2026." January 2026.
  8. European Union. "EU AI Act Article 12: Record-Keeping." Regulation 2024/1689. 2024.
  9. European Union. "EU AI Act Article 14: Human Oversight." Regulation 2024/1689. 2024.
  10. EY and Society for Corporate Governance. "Corporate Governance in Focus: The Delegation Edge." January 2025.
  11. West Monroe. "Speed Wins: Why Fast Decision-Making Is the New Competitive Advantage." 2026. Based on a survey of 1,000 managers and 214 C-suite executives at U.S. companies with at least $250 million in revenue.
  12. APQC. "The CFO's Guide to an Effective Delegation of Authority Policy." April 2025. Based on APQC's 2024 Delegation of Authority Policy Practices survey of 311 finance professionals.
  13. American Law Institute. "Restatement (Third) of Agency." 2006.
  14. National Institute of Standards and Technology. "AI Risk Management Framework 1.0." January 2023.
  15. International Organization for Standardization. "ISO/IEC 42001:2023: Artificial Intelligence Management System." 2023.
  16. European Union. "Markets in Financial Instruments Directive (MiFID II), Directive 2014/65/EU." May 2014.
  17. U.S. Securities and Exchange Commission. "17 CFR §240.17a-4: Records to Be Preserved by Certain Exchange Members, Brokers and Dealers." Code of Federal Regulations.
  18. U.S. Department of Health and Human Services. "45 CFR §164.530(j): HIPAA Privacy Rule Documentation Retention." Code of Federal Regulations.
  19. Public Company Accounting Oversight Board. "AS 2201: An Audit of Internal Control Over Financial Reporting That Is Integrated with An Audit of Financial Statements." PCAOB Auditing Standards.

Get started with Aptly.

Connect with our team for a discovery session to learn more about how Aptly can help within your organization.  If you are already a client and need support, contact us here.