| Lifecycle stage | Required controls | Evidence produced |
|---|---|---|
| Data ingestion | PII detection, access scoping, retention rules | Data lineage logs, access policies |
| Prompt/tool design | Prompt injection defenses, tool allowlists | Prompt versions, policy test results |
| Evaluation | Bias/safety checks, groundedness and hallucination tests | Evaluation reports, threshold history |
| Deployment | Release gates, rollback plans, environment segregation | Signed release records, approval trail |
| Production | Runtime monitoring, incident response, drift alerts | Trace logs, postmortems, remediation actions |