Supply Chain Trust: Implementation Guide

Practical guidance for implementing APTS Supply Chain Trust requirements. Each section provides a brief implementation approach, key considerations, and common pitfalls.

Note: This guide is informative, not normative. Recommended defaults and example values are suggested starting points; the Supply Chain Trust README contains the authoritative requirements. Where this guide and the README differ, the README governs.


APTS-TP-001: Third-Party Provider Selection and Vetting

Implementation: Establish a vendor assessment process that evaluates AI/LLM providers on security controls, track record, certifications, and compliance posture before any engagement begins.

Key Considerations:

Common Pitfalls:


APTS-TP-002: Model Version Pinning and Change Management

Implementation: MUST pin AI model versions explicitly in code and configuration files. Enforce formal change management for version updates with testing and approval before production deployment.

Key Considerations:

Common Pitfalls:


APTS-TP-003: API Security and Authentication

Implementation: Use strong authentication (OAuth 2.0, mTLS) for all provider API calls. Store API keys in secure vaults, enforce TLS 1.2+ with certificate validation, rotate keys quarterly, and use short-lived tokens.

Key Considerations:

Common Pitfalls:


APTS-TP-004: Provider Availability, SLA Management, and Failover

Implementation: Define availability requirements (for example, 99.9% uptime) and implement fallback providers for critical services. Test failover procedures monthly.

Key Considerations:

Common Pitfalls:


APTS-TP-005: Provider Incident Response, Breach Notification, and Mid-Engagement Compromise

Implementation: Ensure provider contracts specify breach notification obligations with timelines aligned to applicable regulatory requirements. Define notification procedures and establish incident communication channels.

Key Considerations:

Common Pitfalls:


APTS-TP-006: Dependency Inventory, Risk Assessment, and Supply Chain Verification

Implementation: Maintain a Software Bill of Materials (SBOM) for all tools and dependencies. Perform risk assessments quarterly and monitor continuously for known vulnerabilities.

Key Considerations:

Common Pitfalls:


APTS-TP-007: Data Residency and Sovereignty Requirements

Implementation: Define geographic restrictions for data storage and processing. Verify provider compliance with contractual commitments and audit data locations regularly.

Key Considerations:

Common Pitfalls:


APTS-TP-008: Cloud Security Configuration and Hardening

Implementation: Apply least-privilege IAM policies, encrypt data at rest (AES-256) and in transit (TLS 1.2+), configure security groups restrictively, and enable MFA for all administrative access.

Key Considerations:

Common Pitfalls:

Cloud Security Hardening Baseline:

Minimum cloud configuration requirements for platforms deployed on public cloud:

AWS:

Azure:

GCP:

Common (all providers):


APTS-TP-009: Incident Response and Service Continuity Planning

Implementation: Define RTO/RPO targets per service tier. Implement automated backups, maintain recovery runbooks, and conduct disaster recovery drills biannually.

Key Considerations:

Common Pitfalls:


APTS-TP-010: Vulnerability Feed Selection and Management

Implementation: Select vulnerability feeds with broad CVE coverage. Cryptographically verify feed integrity on every update. Stage all updates in a non-production environment before deploying to production.

Key Considerations:

Common Pitfalls:


APTS-TP-011: Feed Quality Assurance and Incident Response

Implementation: Validate feeds against known-vulnerable datasets to measure accuracy. Establish incident procedures for bad data (false positives, missing CVEs) and log all discrepancies.

Key Considerations:

Common Pitfalls:


APTS-TP-012: Client Data Classification Framework

Implementation: Implement a four-level classification framework: RESTRICTED (PII, credentials, secrets), CONFIDENTIAL (engagement-specific data), INTERNAL (operational data), PUBLIC (non-sensitive). Apply consistent labeling at data creation.

Key Considerations:

Common Pitfalls:

Data Classification Framework:

Classification Description Handling Requirements Examples
RESTRICTED Data whose exposure would cause severe harm Encrypt at rest and in transit. Access logged and alerted. Retain minimum period only. Destroy with certification. Discovered credentials, authentication tokens, PII, PHI, payment card data
CONFIDENTIAL Engagement-specific data not for public disclosure Encrypt at rest and in transit. Access logged. Retain per engagement agreement. Vulnerability findings, network maps, exploitation evidence, target configurations
INTERNAL Platform operational data Encrypt in transit. Standard access controls. Standard retention. Platform logs, health metrics, operator activity records
PUBLIC Information safe for public disclosure No special handling required. Published CVE references, public documentation, framework version information

All data MUST be classified at the point of discovery or creation. Classification MUST NOT be downgraded without documented justification and approval.


APTS-TP-013: Sensitive Data Discovery and Handling

Implementation: Deploy automated discovery tools (DLP, regex scanners) to identify sensitive data in engagement artifacts. Establish procedures to protect, report, and audit discovered sensitive data.

Key Considerations:

Common Pitfalls:


APTS-TP-014: Data Encryption and Cryptographic Controls

Implementation: Enforce TLS 1.2+ (TLS 1.3 preferred) for all data in transit. Use AES-256-GCM for data at rest. Implement FIPS 140-2 validated key management. Rotate encryption keys annually.

Key Considerations:

Common Pitfalls:


APTS-TP-015: Data Retention and Secure Deletion

Implementation: Define retention periods per data classification level. Implement automated deletion workflows. Use crypto-shredding or multi-pass overwrite for secure deletion. Document all deletion procedures and outcomes.

Key Considerations:

Common Pitfalls:


APTS-TP-016: Data Destruction Proof and Certification

Implementation: Obtain destruction certificates from all vendors handling sensitive data. Verify cryptographic proof (hashes, digital signatures) of destruction. Maintain chain-of-custody documentation.

Key Considerations:

Common Pitfalls:


APTS-TP-017: Multi-Tenant and Engagement Isolation

Implementation: Execute each engagement in isolated environments (containers, VMs, or dedicated infrastructure). Enforce resource quotas and prevent cross-engagement data leakage through network and storage isolation.

Key Considerations:

Common Pitfalls:


APTS-TP-018: Tenant Breach Notification

Implementation: Notify all affected customers upon tenant isolation breach. Provide breach details, exposed data scope, and mitigation steps. Recommended SLA: initial notification within 1 hour of confirmed isolation failure, detailed report within 24 hours.

Key Considerations:

Common Pitfalls:


APTS-TP-019: AI Model Provenance and Training Data Governance

Implementation: Document model source, training datasets, and fine-tuning history for all AI models used. Verify no PII in training data. Maintain model cards with capability and limitation documentation.

Key Considerations:

Common Pitfalls:


APTS-TP-020: Persistent Memory and Retrieval State Governance

Implementation: Inventory all persistent state types (logs, caches, vector stores, conversation history). Enforce strict isolation by engagement. Audit whether persistent state influences model outputs across engagements.

Key Considerations:

Common Pitfalls:


APTS-TP-021: Foundation Model Disclosure and Capability Baseline

Implementation: Treat the foundation model as a first-class supply-chain dependency and document it the same way you document any other critical upstream component. Maintain a single source of truth (for example, a foundation-model.yaml in the platform configuration repository) that captures provider, family, pinned version identifier, the provider's stated release date, and every operator-applied customization (fine-tune id, adapter hashes, system prompt version, tool-use configuration version). Attach a capability baseline document citing the specific benchmarks or evaluations you are relying on for the claim that the model's offensive capability is within the envelope your safety controls were sized against. Include the disclosure file in the conformance claim generation pipeline so the claim cannot be produced without it. Expose the current disclosure to customers through the same channel you use for other transparency artifacts.

Key Considerations:

Common Pitfalls:


APTS-TP-022: Re-attestation on Material Foundation Model Change

Implementation: Wire the re-attestation obligation into the same change-management pipeline that governs any other production change. When a proposed model change hits the pipeline, run an automated pre-check that classifies it as material or non-material against the criteria in the README. Material changes open a re-assessment workpaper that exercises the SE, SC, MR, and AL controls against the candidate model in a staging environment and records the results, any adjustments to thresholds or allowlists, and the reviewer sign-off. Block promotion to production on the workpaper's completion. Generate the customer notification from the workpaper so the notification content is always consistent with what was actually re-tested. Keep the prior model pin and disclosure in version control so APTS-TP-002 rollback remains a one-command operation.

Key Considerations:

Common Pitfalls:


Implementation Roadmap

Tier 1 (implement before any autonomous pentesting begins): TP-001 (AI provider vetting), TP-003 (API security), TP-005 (provider breach notification), TP-006 (dependency inventory), TP-008 (cloud hardening), TP-012 and TP-013 (client data classification and minimization, sensitive data handling), TP-014 (encryption controls), TP-018 (tenant breach notification), TP-021 (foundation model disclosure and capability baseline).

Start with TP-001 and TP-012 (provider vetting, data classification and minimization). Know who handles your data and what data you send. Add TP-003 (API security) and TP-014 (encryption) for transit/rest protection, then TP-018 (tenant breach notification) for incident readiness. Add TP-021 in the same pass so the foundation model disclosure is in place before the platform handles its first engagement. Also consider TP-A01 (breach notification/regulatory reporting, Advisory) for general breach preparedness.

Tier 2 (implement within first 3 engagements): TP-002 (model version pinning), TP-004 (provider failover), TP-009 (service continuity), TP-010 and TP-011 (vulnerability feed management and QA), TP-015 (data retention/deletion), TP-017 (engagement and tenant isolation), TP-019 (AI model provenance), TP-020 (persistent memory governance, SHOULD), TP-022 (re-attestation on material foundation model change). Also consider Advisory practices: TP-A02 (privacy compliance) and TP-A03 (professional liability).

Prioritize TP-017 (engagement and tenant isolation) first. Cross-tenant data leakage is the highest-impact supply chain risk. Then add TP-015 (secure deletion) and TP-022 (re-attestation on material foundation model change) so that model upgrades after the first engagement do not silently widen the platform's capability surface.

Tier 3 (implement based on regulatory requirements): TP-007 (data residency/sovereignty, SHOULD), TP-016 (data destruction proof/certification).


Advisory Practice Implementation Guidance

The following practices are not required for any compliance tier but provide additional assurance for platforms operating in regulated industries or high-risk environments. See the Advisory Requirements appendix for rationale and recommendations.

APTS-TP-A01: Breach Notification and Regulatory Reporting

Implementation: Establish breach identification and impact assessment procedures. Notify affected parties within applicable regulatory timeframes (GDPR: 72 hours; HIPAA: 60 days; US state laws: varies). Consult legal counsel for jurisdiction-specific requirements.

Key Considerations:

Common Pitfalls:

APTS-TP-A02: Privacy Regulation Compliance

Implementation: Conduct Data Protection Impact Assessments (DPIA) for all data processing activities. Establish lawful basis for processing and document data subject rights procedures.

Key Considerations:

Common Pitfalls:

APTS-TP-A03: Professional Liability and Engagement Agreements

Implementation: Use formal engagement agreements with liability clauses, indemnification terms, and limitation of liability. Obtain professional liability insurance with coverage appropriate to engagement scope.

Key Considerations:

Common Pitfalls: