AIUC-1 Standard
The Standard
AIUC-1 is the first comprehensive standard for AI agent security, safety, and trustworthiness. It establishes measurable requirements across six critical domains, giving enterprises a framework to assess whether their AI vendors and internal systems meet a verifiable bar.
The standard addresses a fundamental gap: enterprises cannot reliably assess the security posture of their AI vendors. Without a common benchmark, every organisation reinvents due diligence from scratch. AIUC-1 provides that benchmark, with independent third-party certification rather than self-assessment.
The standard is updated quarterly to reflect emerging threats and regulatory changes. It was developed with over 40 contributors including Microsoft, Google Cloud, JPMorgan Chase, Stanford, and MITRE.
Six Domains
AIUC-1 organises its requirements into six domains. Each domain defines specific, testable criteria rather than aspirational guidance.
Framework Integration
AIUC-1 does not replace existing frameworks. It maps to them, providing a unified assessment that covers requirements from multiple regulatory and industry standards simultaneously.
| Framework | Scope | Relationship |
|---|---|---|
| ISO 42001 | AI management systems | AIUC-1 requirements align with ISO 42001 controls. Certification evidence can support ISO 42001 compliance documentation. |
| MITRE ATLAS | Adversarial threat landscape for AI | Security domain testing references ATLAS attack techniques. Adversarial testing covers known ATLAS threat vectors. |
| EU AI Act | European AI regulation | Domain requirements map to high-risk AI system obligations. Certification evidence supports conformity assessment documentation. |
| NIST AI RMF | AI risk management framework | Six domains align with NIST AI RMF functions (Govern, Map, Measure, Manage). Assessment methodology follows NIST risk-based approach. |
| OWASP Top 10 for LLMs | LLM-specific security vulnerabilities | Security domain covers all OWASP LLM Top 10 categories. Testing includes prompt injection, insecure output handling, and training data poisoning. |
Certification
AIUC-1 certification is granted by independent third-party auditors, not by self-assessment. This is a deliberate design choice: the value of the standard depends on the credibility of the assessment process.
Independent Auditors
Accredited third-party assessors (such as Schellman) conduct the evaluation. The organisation being assessed does not evaluate itself. This mirrors the model used by SOC 2 and ISO certifications.
Quarterly Updates
The standard evolves with the threat landscape. New attack vectors, regulatory changes, and lessons from incidents are incorporated quarterly. Certified organisations must maintain compliance with current requirements.
Evidence-Based
Certification requires demonstrable evidence, not policy documents alone. Auditors test adversarial resistance, review incident response procedures in practice, and verify that controls are operational rather than aspirational.
