Supply Chain Autonomous Agents

by Nick Clark | Published March 27, 2026 | PDF

Cross-organizational supply chains are governed by obligations that no single ERP can hold: ISO 28000 supply chain security management, U.S. Customs-Trade Partnership Against Terrorism and EU Authorized Economic Operator trusted-trader programs, IIJA Section 22425 supply chain mapping for critical materials, FDA FSMA 204 enhanced traceability, USDA NRCS conservation-practice attestation, Verra and Gold Standard carbon registry rules, GS1 EPCIS event interoperability, and NIST Cybersecurity Framework 2.0 controls on the systems that move all of it. Each obligation crosses organizational boundaries the moment it leaves the originating enterprise's perimeter, and each presumes that downstream and upstream parties will produce truthful, timely, and tamper-evident contributions about events that the obligation-holder cannot directly observe. Centralized ERP and visibility platforms describe these obligations and aggregate after-the-fact reports about them; they do not enforce them at the boundaries where supply chains actually live, because the data they aggregate is owned by other systems and translated into their own model with losses that accumulate at every hop. A cognition-native execution platform represents each operation, the purchase order, the shipment, the customs declaration, the conservation-practice attestation, the carbon credit issuance event, the chain-of-custody handoff, as a governed agent that carries its own state, governance, and coordination logic, persists across transit and processing delays, and coordinates at boundaries through verifiable interaction rather than shared infrastructure. The result is a supply chain in which security, traceability, sustainability, and cybersecurity obligations become structural properties of the operations themselves, durable across the multi-party, multi-jurisdiction lifecycles that procedural compliance has never been able to govern end-to-end.


Regulatory Framework

ISO 28000:2022 specifies a management system for supply chain security, requiring documented threat and vulnerability assessments, security objectives proportional to those threats, defined roles and responsibilities, risk treatment plans, monitoring and measurement, internal audits, and continual improvement based on incidents and audits. The 2022 revision aligned the standard with the High-Level Structure shared across ISO management-system standards (9001, 14001, 27001, 45001), making integration with adjacent management systems explicit. The standard contemplates a security posture that travels with the goods rather than stops at the warehouse fence, which presupposes that downstream and upstream partners can attest to the controls they have implemented and that those attestations can be verified at the points of custody transfer. ISO 28001 supplements 28000 with best-practice guidance on supply chain security management, and ISO 28004 addresses implementation, but neither standard provides a structural enforcement mechanism; both presume that conformance is documented and audited rather than continuously evaluated.

C-TPAT (the U.S. Customs-Trade Partnership Against Terrorism) and the European Authorized Economic Operator (AEO) program offer expedited customs treatment in exchange for documented security controls across the importer's, broker's, carrier's, and supplier's operations. Both programs require validation visits, supply chain security profiles, and demonstrated business-partner screening. Compliance is judged at the program-membership level on the importer's ability to show, on demand, that every link in the chain meets the program's minimum security criteria, including the Minimum Security Criteria revisions issued by U.S. Customs and Border Protection that emphasized agricultural security, cybersecurity, and unannounced visits. Mutual recognition arrangements between C-TPAT, AEO, Canada's Partners in Protection, and similar regimes in Mexico, Japan, Korea, Singapore, and elsewhere mean that the same evidence is reused across multiple programs, which raises the value of evidence whose integrity is structurally grounded.

IIJA Section 22425 directs the Department of Energy and partner agencies to map and assess critical-material supply chains for materials including lithium, cobalt, nickel, manganese, graphite, and rare-earth elements that underpin the energy transition. The mapping exercise depends on suppliers, sub-suppliers, and downstream consumers each contributing accurate and timely data about origin, processing, and movement. The Defense Production Act Title III, the Inflation Reduction Act battery sourcing requirements, and Treasury guidance on critical-mineral content for vehicle credits each layer additional sourcing-evidence obligations onto the same chains. FDA FSMA 204, the Food Traceability Final Rule, requires that producers, processors, distributors, and retailers of foods on the Food Traceability List capture and exchange Key Data Elements (KDEs) at Critical Tracking Events (CTEs), which crosses every organizational boundary the product passes through; the compliance date of January 2026 has produced a wave of bilateral integration projects whose limitations expose the structural deficiencies in conventional approaches.

USDA Natural Resources Conservation Service conservation programs (EQIP, CSP, RCPP) require attestations of practice implementation that flow from producer to verifier to program administrator and, increasingly, into private supply-chain sustainability claims that food and consumer-goods companies make to investors and regulators under emerging climate disclosure rules. The intersection between regulated agricultural attestation and voluntary sustainability claims has been complicated by SEC climate-disclosure proposals, the EU Corporate Sustainability Reporting Directive, and the California Climate Corporate Data Accountability Act, all of which raise the cost of misstatement.

Verra Verified Carbon Standard and Gold Standard impose project-level monitoring, reporting, and verification (MRV) cycles that depend on field-level evidence from operators, attestation from validators, and registry events tracked across issuance, transfer, retirement, and cancellation. Recent integrity controversies, particularly around forest-protection methodologies, have pushed both registries toward stronger evidence requirements and clearer chain-of-custody on the underlying monitoring data; the Integrity Council for the Voluntary Carbon Market's Core Carbon Principles formalize the expectation that registry events be auditable to primary evidence. GS1 EPCIS 2.0 provides the shared event grammar that makes cross-organizational visibility possible across food, pharma, consumer goods, and logistics; the Core Business Vocabulary (CBV) supplies the controlled vocabularies (bizStep, disposition, source/destination) that make the events comparable across parties. NIST Cybersecurity Framework 2.0, released in 2024, provides the cybersecurity framework against which the systems handling all of these obligations must be measured, with its newly elevated Govern function explicitly addressing supply chain risk management as a board-level concern. Every framework presumes truthful, timely, and tamper-evident contributions from independent parties whose systems and incentives are not aligned by default.

Architectural Requirement

The aggregate framework demands that supply-chain operations be representable, governable, and auditable as objects that exist independently of any single party's system of record. Each operation must carry its own state so that it survives a custody transfer without being copied lossily into the next system. Each operation must carry its own policy so that the receiving party can evaluate whether to accept, reject, or escalate, and so that the obligations attached to the operation by the originating regulator or contracting party travel with it rather than being re-derived at every hop. Each operation must carry its own lineage so that auditors and regulators can reconstruct what happened without subpoenaing every participant's database, and so that disputes about who knew what and when can be resolved by reference to signed events rather than to recollections.

Coordination must occur at organizational boundaries through verifiable interaction. A purchase order accepted by a supplier must produce a state change on the order itself that both parties recognize and that downstream parties (carriers, customs brokers, financiers) can read without bilateral integration to either party's ERP. A shipment crossing a border must carry the security attestations, the FSMA Key Data Elements, the EPCIS events, and the carbon-accounting metadata as part of its own object, not as separate flows that must be reconciled at the destination from systems with conflicting models. The need to reconcile becomes the dominant cost of multi-party supply chains, and the reconciliation work is largely a search for the version of truth that can be defended on inspection.

Identity must be portable. The actors in a supply chain (carriers, brokers, importers, shippers, regulators, certifying bodies) must hold credentials that any counterparty can verify against published key material, regardless of which platforms or registries the counterparty consults. Decentralized identifier (DID) and verifiable credential primitives have matured to the point where this requirement is technically tractable; the integration challenge is operational rather than cryptographic. Authorization must likewise be expressible as policy that the operation evaluates at the boundary, not as a centralized lookup whose availability becomes a single point of failure during the very disruptions that test the supply chain's resilience.

Disruption response must be governed rather than improvised. When a carrier fails, when a port closes, when a supplier defaults, the response must be evaluated against the same policy that governs normal operation, including ISO 28000 security objectives, C-TPAT business-partner screening, FSMA traceability obligations, NIST CSF availability and integrity targets, and contractual SLAs. Improvised reroutes and substitutions that violate the policy envelope are themselves a source of compliance failure, because the records produced under improvised procedures often cannot be reconstructed to a defensible audit trail when scrutinized. The architecture must enable governed, auditable adaptation in real time, not merely tolerate exceptions that are later normalized through manual reconciliation.

Sustainability and provenance evidence must be cryptographically grounded. Carbon credits, conservation attestations, critical-material origin claims, and ethical-sourcing certifications all rest on monitoring data and field-level evidence whose integrity must be defensible to regulators and to skeptical third parties. The chain from sensor or witness to registry event must be unbroken, and the unbroken chain must be inspectable without requiring the inspector to trust each intermediate party. An execution platform that satisfies these requirements treats each supply chain operation as an autonomous agent: a self-contained, policy-bound, verifiably advancing object whose interactions with other agents are governed at the boundary rather than at a center, whose identity and authority are portable across the participants in the chain, and whose lineage is the durable record of what happened.

Why Procedural Compliance Fails

The current state of cross-organizational supply chain coordination is centralized within enterprises and procedural between them. Inside an enterprise, an ERP holds the state of orders, shipments, receipts, and invoices, and the ERP is the source of truth for that enterprise. Across enterprises, coordination flows through EDI messages (the X12 850/855/856/810 family in North America, EDIFACT analogs in Europe and Asia), portals operated by larger trading partners, email confirmations, spreadsheet exchanges, and ad hoc API integrations stitched together over years of bilateral negotiations. Each handoff is a translation between systems that hold subtly different models of the same operation, and each translation is a place where information is lost, distorted, or fabricated.

Translation losses accumulate. A supplier's acknowledgement of a purchase order, captured in their order-management system, is reduced to an EDI 855 with a subset of the fields and a vocabulary mapping that may or may not preserve the supplier's commitments around lead time, partial shipment authority, and substitution allowances. The buyer's ERP records the acknowledgement against its own model of the order, which may or may not surface the differences. When a carrier picks up the shipment, a third translation occurs: the EDI 856 advance ship notice carries pallet and package detail in a structure that the buyer's warehouse management system parses into yet another internal representation. By the time customs receives the entry, the FSMA traceability lot code, the GS1 EPCIS event, the C-TPAT seal record, and the carbon-accounting reference may live in five different systems with five different identifiers for the same physical pallet, and reconciling them after the fact requires a forensic correlation that no party undertakes routinely.

Visibility platforms attempt to compensate by aggregating these flows into a central view, but they are read-only observers of state owned by other systems. They cannot enforce. They cannot reject a non-compliant handoff at the moment it happens. They cannot revoke an authorization that has been issued in error. When ISO 28000, C-TPAT, FSMA 204, or NIST CSF require structural enforcement of a control, a visibility platform's diligence after the fact cannot substitute for the missing structural mechanism. Worse, the visibility platform itself becomes a privileged target: a successful attack on the platform corrupts the only consolidated view that participants relied on, and there is no independent record to fall back to.

API integration scales quadratically with trading partners. Each new partner relationship requires field mapping, authentication, error handling, version negotiation, and ongoing maintenance as either side's schema evolves. Integration platforms (the iPaaS market, EDI-as-a-service vendors, transportation-management-system networks) reduce the per-partner cost but reintroduce centralization: the platform becomes a single point of failure, a single point of trust, and a single point of policy negotiation. A regulatory regime that depends on integrators' availability is fragile against the very disruptions, ransomware, vendor financial distress, geopolitical disconnection, that supply chain regulations exist to mitigate. None of this satisfies the architectural requirement that each operation carry its own governance.

Sustainability and provenance claims compound the failure. Verra and Gold Standard credit issuances depend on monitoring data that originates with project operators and flows through validators to the registry; if any link in that flow is held in a system the others cannot verify, the credit is structurally suspect, and recent press coverage of carbon credit integrity has demonstrated that this suspicion is sometimes warranted. USDA NRCS practice attestations and IIJA 22425 critical-material mappings face the same difficulty: the data originates outside the enterprise that needs to act on it, and procedural compliance offers no mechanism to enforce truthfulness at the source. Critical-mineral provenance for IRA vehicle credits depends on documentation that miners, refiners, and battery cell producers produce against their own records; the Treasury's guidance presumes auditable chains that today's procedural systems cannot reliably produce at scale.

Cybersecurity obligations under NIST CSF 2.0 expose another layer of procedural failure. The Govern function added in the 2.0 revision elevates supply chain risk management to a board-level concern, requiring organizations to assess and manage risk arising from suppliers, integrators, and software vendors. Procedural compliance produces questionnaires (SIG, CAIQ, vendor security assessments) that are completed once a year by counterparty staff who may or may not have visibility into the operational reality of their own controls. The procedural artifact is decoupled from the operational state, and that decoupling is precisely the gap that supply-chain attacks (SolarWinds, MOVEit, 3CX, and others) have exploited.

What AQ Primitive Provides

The Adaptive Query execution platform represents each supply chain operation as an autonomous, governed agent. A purchase order is not a row in a buyer's ERP table joined by integration to a supplier's row; it is an agent with its own identity, its own state, its own policy, and its own lineage of events. The agent is created by the buyer with terms and conditions encoded as machine-evaluable policy, signed by the buyer's authority, and addressed to the supplier. The supplier evaluates the agent against its own acceptance policy and produces a signed acknowledgement that extends the agent's lineage. From that point forward, both parties refer to the same agent rather than to mirrored copies in independent systems, and the disagreements that arise in conventional EDI-mediated commerce (mismatched quantities, ambiguous substitutions, disputed acknowledgements) collapse to disagreements about what the agent's policy permits, which is a tractable evaluation rather than a forensic reconciliation.

A shipment is an agent that carries the security attestations required by ISO 28000 and C-TPAT, the Key Data Elements required by FSMA 204, the EPCIS events required by GS1, and the carbon-accounting metadata required by Verra or Gold Standard methodology, all as part of a single object whose lineage is signed by each successive custodian. A customs declaration is an agent whose policy encodes the importer's authorization graph and whose lineage proves the chain of custody back to manufacture; the broker's preparation of the entry is a signed mutation, and the customs authority's release is another, with discrepancies surfaced as policy evaluations rather than as broker-side reconciliation work. A conservation-practice attestation under USDA NRCS is an agent that the producer creates, the verifier signs, and the program administrator evaluates against program rules, with the lineage available to any downstream sustainability claim that depends on it; food and consumer-goods companies that need to substantiate scope-3 emissions claims can reference the lineage rather than re-collecting evidence through bilateral surveys.

Cross-organizational coordination occurs through governed semantic interaction at the agent boundary. When a shipment agent arrives at a carrier, the carrier's system evaluates the shipment's policy against its own acceptance criteria: is the carrier authorized to handle the cargo class under the importer's C-TPAT membership, are the FSMA-required Key Data Elements present, does the temperature envelope match the carrier's equipment qualification, are the customs filings consistent with the planned routing. The carrier's signed pickup event extends the shipment's lineage; the buyer and the supplier and the customs broker all see the same event because they all reference the same agent. There is no integration to maintain because there is no separate copy to reconcile, and the reconciliation engineering that today consumes supply-chain IT budgets becomes a property of the agent rather than a perpetual project.

Disruption response is governed by the agent's policy. A shipment whose preferred carrier becomes unavailable evaluates alternative carriers against its policy, including ISO 28000 security tier, C-TPAT business-partner status, transit-time bounds, cost ceilings, and any product-specific requirements (cold-chain qualification, hazardous-materials authorization, country-of-origin restrictions for sanctioned routings). The agent re-routes within its governance envelope without waiting for human attention, and the lineage records the policy evaluation so that any later audit can verify that the reroute was within authority. When the policy envelope cannot be satisfied, the agent escalates to a human authority whose decision becomes a signed exception event, preserving the auditable record that improvised reroutes today destroy. Force-majeure events, port closures, sanctioned-entity additions, and regulatory rule changes propagate through the same mechanism: signed updates that the agents evaluate at their next decision point.

NIST CSF 2.0 controls apply to the agent platform itself: Govern, Identify, Protect, Detect, Respond, and Recover functions are exercised on the platform's identity, signature, and policy infrastructure. Because the agents are cryptographically signed and lineage-extended, integrity and non-repudiation are structural properties rather than procedural promises. Supply-chain attack vectors that today rely on poisoning data in transit, compromising a vendor's reporting system, or altering records during ransomware dwell time are detected at the next signature verification, because the cryptographic linkage exposes mutation independent of the system that holds the records. Identity for participants is grounded in verifiable credentials that any counterparty can evaluate, eliminating the bilateral identity-bootstrap problem that today gates new partner onboarding.

The platform composes across regulatory regimes. A shipment that must satisfy C-TPAT for U.S. import, AEO for European transit, FSMA 204 for downstream retail, and a sustainability commitment under a Gold Standard methodology carries the union of obligations as policy and emits the projection each regime requires from the same lineage. The marginal cost of adding a regime is the marginal cost of expressing its policy and emitting its projection, not the marginal cost of building a parallel record system, which is the dominant cost of multi-regime compliance today.

Compliance Mapping

ISO 28000 security objectives become policy on shipment and custody-transfer agents; the management-system documentation, threats, vulnerabilities, controls, residual risks, is satisfied by the policy and lineage of the agents that move the goods, with continual-improvement metrics derivable from lineage analytics rather than from sampled internal audits. C-TPAT and AEO business-partner screening becomes a policy evaluation at the moment a partner attempts to take custody, and the validation visit becomes a review of the policy and lineage rather than of disjoint records reconstructed for the auditor. Mutual-recognition arrangements between trusted-trader programs benefit because the same lineage evidence supports each program's projection, eliminating the duplicated documentation effort that multi-program members carry today.

IIJA Section 22425 critical-material mapping is satisfied by querying the lineage of the relevant material agents, which already carry origin, processing, and movement events as part of their structure; the Department of Energy's mapping exercise becomes a federation of structured queries against participating chains rather than a survey-driven data call. The Inflation Reduction Act vehicle-credit critical-mineral content rules, the Defense Production Act Title III sourcing requirements, and the EU Critical Raw Materials Act provenance rules all draw on the same agents and the same lineage, eliminating duplicated provenance reporting. FDA FSMA 204 Key Data Elements at Critical Tracking Events emit as a GS1 EPCIS-shaped projection of agent lineage, eliminating the parallel record-keeping that procedural compliance requires; the bilateral integration projects that have dominated FSMA 204 readiness investment become unnecessary as participants converge on lineage as the canonical exchange.

USDA NRCS conservation-practice attestations are agents whose lineage proves field-level implementation, validator review, and administrator approval. Downstream supply chains that wish to claim the resulting environmental benefit reference the lineage directly, eliminating the verification-by-survey methodology that today underlies most scope-3 emissions accounting. Verra and Gold Standard issuance, transfer, retirement, and cancellation events are mutations on credit agents whose lineage cannot be silently rewritten, addressing the registry-integrity concerns that procedural double-counting controls struggle with; the Integrity Council for the Voluntary Carbon Market's Core Carbon Principles align naturally with the lineage discipline because both demand that registry events be auditable to primary evidence.

NIST CSF 2.0 Govern, Identify, Protect, Detect, Respond, and Recover functions map onto the platform's identity infrastructure, signature scheme, lineage tamper-evidence, anomaly detection on agent state machines, automated response policies, and recovery from cryptographic primitives that survive partial system loss. The Govern function's specific elevation of supply chain risk management is served by the agents themselves: the policy and lineage are the ongoing evidence of governance rather than annual artifacts produced for board reporting. SOC 2, ISO/IEC 27001, and ISO/IEC 27036 supplier-security expectations align with the same primitives. The intersection with sector-specific regimes (HIPAA for healthcare logistics, CMMC for defense supply chains, TSA pipeline cybersecurity directives for energy logistics) is served by composing the relevant policy onto the existing agents rather than building parallel control systems.

Adoption Pathway

Adoption begins with a single high-value flow, typically inbound shipments of a critical material under IIJA 22425 attention, a regulated food under FSMA 204, or a high-risk pharmaceutical under DSCSA, where the cost of procedural compliance is already significant and the value of structural enforcement is immediate. The buyer issues purchase orders as agents alongside the existing EDI flow; the supplier receives both, signs the agent, and continues to send the EDI 855 for downstream-system continuity. Internal stakeholders (procurement, quality, compliance, transportation) interact with the agent through familiar interfaces, while the agent itself accumulates the cryptographic lineage that will eventually replace the parallel record systems.

The first carrier in the lane deploys an agent-aware gateway that signs pickup, in-transit, and delivery events on the shipment agent. The carrier's TMS continues to operate; the gateway runs alongside it as an integrity layer that signs the events the TMS already produces. The customs broker integrates next, signing the entry event, with the broker's filing system extended to consume policy from the agent and emit the appropriate filings to the customs authority. EPCIS events emit as a derived projection so that existing visibility platforms continue to see what they have always seen; the platforms become consumers of a projection rather than authoritative aggregators, which is a smaller and more defensible role.

Inside the buyer's enterprise, the ERP continues to operate; the agent layer runs alongside it and is reconciled to the ERP through a thin adapter that posts agent events as ERP transactions and posts ERP-originated events as agent mutations. Validation under existing computer-system-validation regimes (Annex 11, GAMP 5, internal Sox controls) focuses on the adapter and on the cryptographic primitives, rather than on a re-validation of the entire ERP. Pilot metrics typically focus on three things: the rate at which the gateway detects integrity issues that the procedural workflow missed, the time-to-decision on disruptions and exceptions, and the operational impact on lane throughput, which in well-engineered deployments is indistinguishable from baseline.

From that beachhead, adoption expands along three axes: more flows on the same lanes, more lanes on the same network, and more compliance regimes mapped onto the same agents. ISO 28000 and C-TPAT controls are added as policy on the existing shipment agents. USDA NRCS and Verra or Gold Standard attestations are added as upstream agents whose lineage is referenced by the inbound material agents, allowing scope-3 emissions claims and ethical-sourcing certifications to be substantiated structurally. NIST CSF 2.0 governance metrics derive from the agent platform's own monitoring, eliminating the gap between what the security function reports and what the operational systems actually do.

Over a multi-year horizon, the procedural ERP and EDI flows continue for continuity while the structural enforcement closes the gaps that procedural coordination has never been able to close. The integration project portfolio shrinks because new partners onboard against the agent platform rather than against bilateral schemas. Regulatory engagement (with CBP, FDA, USDA, DOE, SEC, the European Commission, and analogous bodies) becomes a discussion of how to consume the projection that the agents emit, rather than a debate about whose system holds the authoritative version of the record. The end state is a supply chain in which security, traceability, sustainability, and cybersecurity obligations are properties of the operations themselves, satisfied at the boundaries where the operations cross between organizations rather than re-derived after the fact from incomplete and incompatible records, with the regulatory framework served as a property of the system rather than as an aspiration of its participants.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01