Architecture

ACR Runtime Control Architecture

A 7-layer runtime control stack that establishes the mandatory enforcement boundary between autonomous AI agents and protected enterprise systems.

7-Layer Control Stack

Every protected action traverses the full stack.

7

Human Authority Layer

Escalation authority matrix, approval gating, break-glass capability, timeout enforcement

6

Containment Layer

Kill capability, graduated isolation, safe-state definitions, quarterly testing

5

Drift Detection Layer

Behavioral baselines, thresholded response tiers, drift scoring, calibration evidence

4

Observability Layer

Complete decision trails, correlation identifiers, tamper-evident logging, audit export

3

Policy Enforcement Layer

Input, Execution, and Output Boundary controls. Machine-enforceable, runtime-executed

2

Decision Engine Layer

Four-state model: ALLOW, DENY, MODIFY, ESCALATE. Deterministic precedence ordering

1

Identity & Purpose Layer

Agent identity binding, purpose declaration, scope constraints, manifest management

Before and After ACR

From uncontrolled to controlled.

Without ACR

  • Agents reach tools directly with raw credentials
  • Policy exists as documentation, not enforcement
  • Monitoring detects problems after harm propagates
  • No mandatory trust path for protected actions
  • Containment requires manual intervention
  • Audit reconstruction depends on unstructured logs

With ACR

  • Every action traverses mandatory control plane trust path
  • Policy is machine-enforced at runtime boundaries
  • Pre-execution control prevents unauthorized actions
  • Deny-by-default when no authorization condition is met
  • Graduated automated containment with 30-second kill
  • Correlation-ID-based audit export, reconstructable
Failure Modes

The system fails secure, never fails open.

Fail-Secure

Control plane unavailable: deny all protected actions, enter safe-state. No implicit trust.

Fail-Safe

Policy engine timeout or indeterminate result: treat as DENY, log failure condition.

High Availability

Containment capability remains operable even when the agent runtime is unavailable, unresponsive, or compromised.

Break-Glass

Emergency override: scoped, time-limited, tamper-evident logged, mandatory post-use review.

Measurable Outcomes

Concrete improvements from runtime control.

MetricBefore ACRAfter ACR
Unauthorized execution attemptsUndetectedBlocked at boundary
Mean time to containmentHours to days< 30 seconds
Audit reconstructionManual log searchCorrelation-ID based export
Drift responsePost-incident reviewThresholded automatic tiers
Policy enforcementDocumentation-onlyMachine-enforced at runtime
Runtime Flow Example

How a refund action traverses the control plane.

1

Agent proposes refund action for customer order #4821

2

Control plane intercepts: validates agent identity and purpose (customer-service-agent, refund_processing)

3

Policy evaluation: checks refund amount against tier limit ($500), verifies customer verification status

4

Decision: ALLOW (amount within tier, customer verified, agent within scope)

5

Authority issued: scoped execution token bound to refund action, target payment API, 60s TTL

6

Protected executor verifies token: issuer, audience, payload hash, expiration

7

Refund executes. Evidence logged with correlation ID linking full decision chain.