Six Control Pillars

Operational Controls for Runtime AI Governance

Each pillar defines control objectives, enforcement patterns, evidence requirements, and verification criteria derived from the ACR Standard v1.0.1. Together they form the complete control surface of the ACR Runtime Control Plane.

P1

Identity & Purpose Binding

ACR Standard v1.0.1 §15

Every agent must have a unique identity and a declared purpose. Constraints are tied to that purpose. The system must maintain an authoritative agent record containing agent_id, owner, purpose, risk tier, allowed tools, forbidden tools, approved data access scope, and operational boundaries.

Control Objectives

  • Ensure every protected action is attributable to a single registered agent identity
  • Bind execution authority to a declared purpose with enforceable scope constraints
  • Prevent agents from acting outside their declared purpose without authorized manifest changes
  • Maintain cryptographic proof of identity for every protected action

Control Mechanisms

  • Unique agent identity with cryptographic proof
  • Declared purpose with scope constraints
  • Authoritative agent manifest or record
  • Identity validation for every protected action
  • Purpose change requires authorized control path, versioning, and audit trail
  • Revocation prevents future action execution

Evidence Requirements

  • Agent registry with required fields
  • Identity validation logs
  • Manifest version history
  • Out-of-scope denial records

STRIKE Threats Addressed

Spoofing

Identity verification, credential validation, anti-replay controls, executor verification of control-plane-issued authority

Required at Level 2 (Enforcement) and above. Identity and purpose binding is a prerequisite for all protected action evaluation.

P2

Behavioral Policy Enforcement

ACR Standard v1.0.1 §16

The control plane enforces policy at three boundaries: Input, Execution, and Output. Policy enforcement is machine-enforceable and runtime-executed. Documentation-only policies do not satisfy this requirement.

Control Objectives

  • Enforce deterministic, machine-readable policy at every control boundary
  • Ensure no protected action bypasses policy evaluation
  • Maintain versioned policy definitions with traceable decision evidence
  • Default to DENY when the policy engine is unavailable or indeterminate

Control Mechanisms

  • Input Boundary: schema validation, prompt sanitization, injection detection, source trust
  • Execution Boundary: tool allowlisting, destination restriction, parameter validation, rate limits, approval gating
  • Output Boundary: PII/PHI redaction, output filtering, destination-aware release restrictions
  • Deny-by-default when policy engine unavailable
  • Versioned policy definitions with decision evidence

Evidence Requirements

  • Policy decision records with version, outcome, justification
  • Boundary control audit logs
  • Policy engine failure and denial records

STRIKE Threats Addressed

Tampering

Payload binding, integrity verification, tamper-evident logging, rejection of altered execution requests

Reflection Abuse

Input validation, injection detection, output and action constraints preventing malicious instruction reflection

Information Leakage

Data access scoping, output filtering, redaction, destination-aware controls

Level 2 requires enforcement at Execution Boundary. Level 3 requires enforcement at all three boundaries (Input, Execution, Output).

P3

Autonomy Drift Detection

ACR Standard v1.0.1 §17

The system detects deviations from intended role, expected patterns, or approved boundaries. Drift detection requires a defined behavioral baseline, detection signals, thresholded response criteria, and evidence of review or calibration.

Control Objectives

  • Detect unauthorized or anomalous deviations from intended agent behavior
  • Establish deterministic baselines before enabling unrestricted autonomous execution
  • Map drift signals to documented response tiers without ad hoc interpretation
  • Retain sufficient evidence to reconstruct why any response was triggered

Control Mechanisms

  • Behavioral baseline established before unrestricted execution (30 days minimum or documented temporary baseline)
  • Monitoring: tool usage, data access, action frequency, repeated denials, escalation pressure, novel sequences, off-hours activity
  • Normalized drift score (0.0 to 1.0) or severity classification
  • Response tiers: throttle, restrict, isolate, kill
  • Threshold crossings trigger documented response without ad hoc interpretation

Evidence Requirements

  • Baseline version and training basis
  • Drift signal history
  • Threshold values and response actions
  • False-positive review and calibration records

STRIKE Threats Addressed

Emergence

Purpose binding, drift detection, anomaly response, approval gating for novel high-impact behavior, containment thresholds

Reflection Abuse

Repeated denial pattern detection, prompt-manipulation indicators triggering drift escalation

Required at Level 3 (Full Runtime Control Plane Compliance). Drift detection with thresholded response is a Level 3 capability.

P4

Execution Observability

ACR Standard v1.0.1 §18

The system logs all actions and all decisions. Observability records enable reconstruction of who acted, what was proposed, what controls applied, what disposition was produced, what approvals occurred, and what downstream execution resulted.

Control Objectives

  • Enable full reconstruction of any protected action chain from proposal to outcome
  • Maintain tamper-evident records for all high-risk events
  • Provide audit-ready export without manual reconstruction from unstructured logs
  • Enforce minimum retention periods (90 days standard, 13 months high-risk)

Control Mechanisms

  • Telemetry records: schema version, event ID, timestamp, event type, agent ID, purpose, correlation ID, decision outcome, policy results
  • Correlation identifiers across the full action chain
  • High-risk events in tamper-evident or append-only form
  • Retention: 90 days minimum for all events, 13 months for high-risk
  • Audit-ready export without manual reconstruction
  • Privacy-preserving treatment for sensitive fields

Evidence Requirements

  • Sample event records with required fields
  • Evidence export samples
  • Retention policy documentation
  • High-risk log integrity configuration

STRIKE Threats Addressed

Tampering

Append-only or tamper-evident logging, audit-chain break detection

Information Leakage

Sensitive-data detection alerts, unauthorized data-access attempt logging

Required at Level 1 (Observability) and above. Level 1 is the foundation: action logging, decision logging, correlation IDs, and audit export.

P5

Self-Healing & Containment

ACR Standard v1.0.1 §19

The system maintains containment capability independent of the agent runtime. This includes an externally operable kill capability, isolation modes, documented safe-states, and logging of all containment actions.

Control Objectives

  • Ensure unsafe behavior can be stopped within 30 seconds of activation
  • Maintain containment capability that operates independently of the agent runtime
  • Define and test safe-states for every production agent
  • Document rollback support or compensating controls for state-changing actions

Control Mechanisms

  • Kill capability: operates outside agent runtime, invocable by authorized humans, completes within 30 seconds
  • Graduated containment: throttle, restrict, isolate, kill
  • Safe-state per production agent: defines permitted actions, disabled actions, escalation path, evidence preservation
  • Rollback support documented (or compensating controls if not possible)
  • Quarterly testing of kill-switch and safe-state procedures

Evidence Requirements

  • Kill-switch test records
  • Safe-state test records
  • Containment tier activation logs
  • Quarterly test evidence with retention

STRIKE Threats Addressed

Kill Chain Extension

Sequence-aware policy, destination restriction, network isolation, graduated containment, correlation of multi-step execution paths

Level 2 requires containment capability with kill path. Level 3 adds graduated containment, quarterly testing, and safe-state definitions.

P6

Human Authority

ACR Standard v1.0.1 §20

Human authority remains the final governance layer for actions classified above the autonomous tier. The system classifies actions into risk tiers and maintains an escalation authority matrix.

Control Objectives

  • Ensure no high-risk action executes without human approval
  • Classify all protected actions into deterministic risk tiers
  • Maintain operable human authority controls even if agent runtime is unavailable
  • Provide reviewers with full context for informed approval decisions

Control Mechanisms

  • Risk-tiered action classification: autonomous, review/gating, explicit approval
  • New or unclassified high-impact actions default to highest approval class
  • Escalation authority matrix: roles, delegation limits, backup approvers, timeout behavior
  • Approval records with full context: identity, purpose, action, parameters, policy basis, drift state, timeout deadline
  • Break-glass capability (if provided): scoped, time-limited, tamper-evident, mandatory post-use review

Evidence Requirements

  • Action tier classification records
  • Approval and denial records
  • Escalation authority matrix
  • Break-glass event logs and review records

STRIKE Threats Addressed

Emergence

Approval gating for novel high-impact behavior, escalation to human authority when drift thresholds are exceeded

Level 2 requires approval gating for escalated actions. Level 3 adds formal escalation authority matrix and audit-ready evidence bundles.