EU AI Act Article 72: A Developer's Guide to Post-Market Monitoring
The enforcement deadline is four months away. Article 72 requires continuous post-market monitoring for high-risk AI systems. Here is what your engineering team needs to build, and how to automate most of it.
The clock is ticking
August 2, 2026. That is the date the EU AI Act's provisions on high-risk AI systems become fully enforceable. If your organization deploys AI systems that fall under the high-risk classification, and that includes most AI agents operating in finance, healthcare, HR, legal, and critical infrastructure, you have four months to demonstrate compliance.
The penalties are not theoretical. Non-compliance with high-risk system requirements carries fines of up to 7% of global annual revenue. For context, GDPR maxes out at 4%. The EU is not being subtle about this. They are signaling that AI governance failures will be treated more severely than data protection failures, and GDPR enforcement has already produced billion-dollar fines.
Most engineering teams have not started. The regulation is dense, the requirements are broad, and the tooling landscape is immature. This guide cuts through the legal language and gives you what you actually need: a practical understanding of what Article 72 demands, what your team needs to build, and how to automate the hardest parts.
Article 72 does not stand alone. It sits on top of Article 12, which requires high-risk AI systems to automatically record events over their entire lifecycle. Article 12 is the forensic record. Article 72 is the obligation to monitor and report on that record continuously. If you have no durable record of what your agent did, you cannot monitor it, you cannot report on it, and you cannot prove conformity. Everything downstream depends on the record, and most teams do not have one.
What Article 72 actually requires
Article 72 mandates that providers of high-risk AI systems establish a post-market monitoring system that is "proportionate to the nature of the artificial intelligence technologies and the risks of the high-risk AI system." In practice, this breaks down into four concrete obligations.
Continuous monitoring of system performance in real-world conditions. You cannot rely on pre-deployment testing alone. The regulation explicitly requires monitoring how your AI system performs after it is deployed, in production, with real users and real data. This means logging every meaningful interaction, tracking accuracy and reliability metrics over time, and maintaining evidence that monitoring was active during the entire reporting period.
Systematic collection and analysis of relevant data. Raw logs are not enough. You need structured data collection that maps to specific risk categories, with analysis pipelines that can surface trends, anomalies, and degradation patterns. The emphasis on "systematic" is deliberate. Ad hoc monitoring will not satisfy an auditor.
Incident detection and reporting within required timeframes. When something goes wrong, you need to detect it automatically and report it within the timeframes the regulation specifies. This means alerting infrastructure, incident classification logic, and a documented reporting workflow. Manual incident discovery is a compliance gap.
Technical documentation demonstrating ongoing conformity. You must produce documentation that proves your system continues to meet its conformity requirements over time. This is not a one-time certification. It is a continuous obligation. Every quarter, every year, for as long as the system is in production.
What this means for engineering teams
Strip away the legal language and the engineering requirements become clear. You need four capabilities that most teams do not have today.
First, audit trails for every agent interaction. Every input, every output, every tool call, every decision point. These trails must be immutable, timestamped, and queryable. When an auditor asks "show me what your agent did on March 15 between 2pm and 3pm," you need to produce that data in minutes, not weeks.
Second, runtime monitoring that detects behavioral degradation. Your AI agent might perform perfectly in testing and then drift in production as user patterns change, underlying models get updated, or data distributions shift. You need monitoring that can detect when system behavior deviates from its established baseline, not just when it crashes.
Third, automated incident detection. If your agent starts returning PII, making unauthorized tool calls, or producing outputs that violate your policies, you cannot rely on a user filing a bug report. You need automated detection that triggers alerts and, in critical cases, circuit breakers that pause the agent until a human reviews the situation.
Fourth, on-demand compliance report generation. Auditors will not wait for your team to manually compile evidence. You need the ability to generate a complete compliance report, covering system performance, incident history, policy enforcement records, and conformity documentation, with a single command or API call.
This is not a checkbox exercise. Auditors will ask for evidence that your monitoring was active and effective during the entire reporting period. Gaps in coverage are findings. Gaps in documentation are findings. "We started monitoring last month" when the system has been live for a year is a finding.
Start the Article 12 record now
Project AIR™ writes every agent decision as a signed forensic record. The compliance engine exports it as Article 72 evidence.
The compliance frameworks landscape
The EU AI Act does not exist in isolation. Most organizations deploying AI systems are already subject to multiple compliance frameworks, and Article 72 requirements overlap significantly with NIST AI Risk Management Framework controls and SOC 2 Trust Services Criteria adapted for AI. Building separate compliance pipelines for each framework is wasteful. The smart approach is to collect data once and map it to multiple frameworks simultaneously.
Vindicara's compliance engine currently supports three frameworks. This is the actual API response from the /v1/compliance/frameworks endpoint:
[
{
"framework_id": "eu-ai-act-article-72",
"name": "EU AI Act Article 72",
"description": "Post-market monitoring requirements for high-risk AI systems",
"control_count": 8,
"version": "1.0"
},
{
"framework_id": "nist-ai-rmf",
"name": "NIST AI Risk Management Framework",
"description": "Risk management controls for AI systems per NIST AI RMF",
"control_count": 8,
"version": "1.0"
},
{
"framework_id": "soc2-ai",
"name": "SOC 2 AI Controls",
"description": "SOC 2 Trust Services Criteria adapted for AI systems",
"control_count": 8,
"version": "1.0"
}
]Each framework defines a set of controls that map directly to the data Vindicara collects during normal runtime operations. Policy evaluation logs map to audit controls. Behavioral monitoring data maps to performance tracking controls. Incident alerts map to incident management controls. The compliance report is a projection of data you are already collecting, not an additional data collection burden.
Automating compliance evidence
Here is the core insight: if your agents produce a signed forensic record of every decision, you have audit-ready evidence inputs. Project AIR writes each agent step as an AgDR (AI Decision Record) with a BLAKE3 content hash, an Ed25519 signature, and a forward-chained hash linking it to the previous step. That chain is the runtime evidence Article 12 record-keeping requires. Your compliance team and counsel project the same chain into whatever format the regulator wants, whether that is Article 72 post-market monitoring, NIST AI RMF, SOC 2, or California SB 53 incident reporting. One record, many exports, much less manual evidence gathering.
This ordering matters. Generating compliance reports from aggregate dashboards is fragile: if an auditor asks which prompt triggered which output on which date, a bar chart will not answer. A signed, per-step forensic record will. AIR's default unit of truth is the decision, not the metric. Reports roll up from there.
Generating an Article 72 compliance report is a single API call:
import vindicara
vc = vindicara.Client(api_key="vnd_...")
report = vc.compliance.generate(
framework="eu-ai-act-article-72",
system_id="sales-assistant-v2",
period="2026-Q1"
)
# report contains:
# - System performance metrics for the period
# - Policy violation summary with severity breakdown
# - Incident detection and response timeline
# - Behavioral drift analysis
# - Technical conformity documentation
# - Evidence package ready for auditor reviewThe report covers the entire reporting period. It includes system performance metrics, a policy violation summary with severity breakdown, an incident detection and response timeline, behavioral drift analysis, and technical conformity documentation. Every data point links back to the specific runtime event that generated it, providing full traceability from the compliance assertion to the underlying evidence.
The same data maps to NIST AI RMF and SOC 2 controls. Change the framework parameter to nist-ai-rmf or soc2-ai, and the engine reorganizes the same runtime data into the format that framework requires. One data collection pipeline. Three compliance reports. Zero manual evidence gathering.
Getting started before the deadline
You have four months. That sounds tight, but it is enough if you start now. The teams that begin collecting runtime data in April will have four months of monitoring evidence when auditors come calling in August. The teams that start in July will be scrambling to retroactively demonstrate compliance for a system that was running unmonitored.
The practical path forward is straightforward. Install the Vindicara SDK. Wrap your agent's inputs and outputs with the guard function. Enable behavioral monitoring. Let the system collect data for weeks before you need to produce your first report. When the auditor asks for evidence, generate the report. The data is already there.
Compliance is not a project with a delivery date. It is a continuous obligation that runs for as long as your AI system is in production. The earlier you instrument your systems, the stronger your compliance posture becomes. Every day of monitoring data is evidence. Every day without it is a gap an auditor will flag.
Project AIR turns every agent decision into a signed forensic record, and the compliance engine turns that record into regulatory evidence automatically. The deadline is August 2. The time to start the record is now.
Forensic record in. Compliance evidence out.
The air CLI is open source. Start writing the signed record today.