
More than 120 AIUC-1 Consortium members and technical contributors took part in this quarter’s update process through a series of CISO roundtables, technical sessions, and peer-reviews. This work led to 14 requirements and 23 controls being updated and added.
New controls for MCP and A2A protocol security
Without dedicated controls governing MCP and A2A, agents are left exposed to prompt injection, tool poisoning, and supply chain attacks. These interfaces are already being actively exploited - in one notable case, a widely-used third-party MCP server for Figma (CVE-2025-53967) failed to sanitize user input, providing unauthenticated attackers full remote code execution on developer machines.
This quarterly update strengthens AIUC-1 controls to govern MCP and A2A security across authentication, transport, runtime containment, and logging:
Strengthening controls for third-party risk management
While traditional third parties are static and known in advance, AI-specific third parties like MCP servers, third-party agents, and plugin registries are discovered and connected dynamically at runtime - creating an attack surface that shifts with every execution.
This quarterly update extends AIUC-1 to address both types of third-party risk management:
Third-party risk remains a priority area and further updates are expected in the July 15 release. For example, Consortium members have proposed strengthening third-party access governance and detection capabilities, with work ongoing to explore how this could be integrated in the standard.
Governing agent identity, permissions, and access management
Agent identity, permission and access management is becoming a critical concern as agents take on more autonomous actions, from executing multi-step workflows across connected systems to spawning sub-agents that may inherit broad permissions with no audit trail. We've extended controls to address this directly:
The peer-review made clear that best practices for agent identity and access management are still maturing - AIUC-1 controls will continue to be refined as industry evolves.
As this quarter’s update is being released, the work is already underway for the next quarterly update in July. This iterative process enables further research and in-depth technical sessions on areas where solutions are still forming.
Priority areas already emerging include:
Read more about the process behind the quarterly updates of AIUC-1 here.
Thank you to the CISOs, GRC practitioners, security leaders, legal experts, and academics who took part in this quarterly update process - your engagement is critical to ensure that AIUC-1 remains up-to-date and works in practice.
All updates to the standard are documented transparently, with the full changelog accessible here.

