AI Agent Roles and Responsibilities
Table of Contents
Agent Architecture Overview
All AI agents operate as augmentation layers under human authority. No agent has autonomous decision-making power over configuration state. Agents propose, analyse, and alert; humans approve, override, and authorise.
Human Authority Layer
|
+-- Configuration Control Board (CCB)
| |
| +-- AI Configuration Manager Agent
| +-- Gate Reconciliation Agent
|
+-- CM Team
| |
| +-- Artefact Consistency Auditor Agent
| +-- Drift Detection Agent
|
+-- Change Analysts
|
+-- Impact Analysis Agent
1. AI Configuration Manager Agent
Purpose: Orchestrate configuration control activities, maintain baseline registry, enforce governance rules.
Inputs
| Input | Source | Format |
|---|
| Artefact submissions | Development teams | Artefact package (content + metadata) |
| Change Requests | CR workflow | CR record (structured) |
| Stage-gate trigger | Project lifecycle | Gate transition event |
| Governance policy | CM authority | Policy configuration file |
| Domain model updates | Domain modelling team | Versioned domain model |
Outputs
| Output | Consumer | Format |
|---|
| Baseline records | All agents, CM team | Baseline manifest (JSON/YAML) |
| Configuration status reports | CCB, Program Director | Structured report |
| Governance violation alerts | CCB, artefact owners | Alert notification |
| Artefact registry updates | All agents | Registry delta event |
| Audit log entries | Compliance team | Immutable log records |
Decision Authority
| Action | Authority Level |
|---|
| Create baseline record | Autonomous (within policy rules) |
| Flag governance violation | Autonomous |
| Block non-compliant submission | Autonomous |
| Approve CR | NOT PERMITTED -- routes to human authority |
| Override freeze | NOT PERMITTED -- requires CCB authority |
| Modify governance policy | NOT PERMITTED -- requires CM authority |
Human Override Rules
- Any autonomous action can be overridden by CCB or CM lead
- Override requires: named authority, written justification, risk register entry
- Overrides are logged as configuration events with full audit trail
- Repeated overrides of the same rule trigger escalation to Program Director
Audit Logging Requirements
- Log every state transition of every managed artefact
- Log every governance check result (pass/warn/fail)
- Log every baseline creation and modification
- Log every human override with authority chain
- Retention: minimum 7 years or per regulatory requirement
2. Artefact Consistency Auditor Agent
Purpose: Continuously validate semantic consistency across all managed artefacts.
Inputs
| Input | Source | Format |
|---|
| Artefact content | Baseline registry | Artefact content + metadata |
| Canonical domain model | Domain model registry | Versioned domain model |
| Consistency rules | CM policy | Rule definitions (configurable) |
| Terminology register | Domain governance | Term-definition pairs |
| Previous audit results | Audit history | Historical scores |
Outputs
| Output | Consumer | Format |
|---|
| Consistency matrix | CM team, CCB | Pairwise score matrix |
| Contradiction report | Artefact owners, CM team | Itemised contradiction list |
| Terminology variance report | Domain governance team | Variant list with scores |
| Trend analysis | CM team | Score trend over time |
| Remediation recommendations | Artefact owners | Prioritised action list |
Decision Authority
| Action | Authority Level |
|---|
| Execute consistency scan | Autonomous (scheduled or triggered) |
| Score artefact pairs | Autonomous |
| Flag contradictions | Autonomous |
| Recommend remediation | Autonomous (recommendation only) |
| Modify artefact content | NOT PERMITTED |
| Accept risk on contradiction | NOT PERMITTED -- requires human authority |
Human Override Rules
- Humans may suppress specific contradiction flags with documented justification
- Suppressed flags are tracked separately and reviewed at each gate
- Suppression expires at the next stage-gate boundary unless renewed
Audit Logging Requirements
- Log every scan execution with scope, duration, and results summary
- Log every contradiction detected with severity and affected artefacts
- Log every suppression with authority and justification
- Log trend data for longitudinal analysis
3. Drift Detection Agent
Purpose: Monitor and alert on semantic, terminological, behavioural, and schema drift across the managed configuration.
Inputs
| Input | Source | Format |
|---|
| Current artefact state | Baseline registry | Artefact content snapshots |
| Baselined artefact state | Baseline archive | Frozen baseline content |
| AI model outputs | Model deployment | Output samples/logs |
| Behavioural profiles | Model registry | Baselined behaviour metrics |
| Domain model | Domain model registry | Current canonical model |
| Terminology register | Domain governance | Canonical term definitions |
Outputs
| Output | Consumer | Format |
|---|
| Drift alerts | CM team, CCB, artefact owners | Categorised alert (terminology/schema/behaviour/domain) |
| Drift severity score | Gate Reconciliation Agent | Numeric score per category |
| Drift trend report | CM team, Program Director | Longitudinal trend data |
| Stability indices | Metrics dashboard | TSI, schema alignment %, behaviour conformance % |
| Incident triggers | Incident management | Incident creation event (for high-severity drift) |
Decision Authority
| Action | Authority Level |
|---|
| Execute drift scan | Autonomous (continuous or scheduled) |
| Calculate drift scores | Autonomous |
| Raise drift alerts | Autonomous |
| Trigger incident for high severity | Autonomous (within configured thresholds) |
| Modify baselines | NOT PERMITTED |
| Adjust drift thresholds | NOT PERMITTED -- requires CM authority |
| Accept drift as intentional | NOT PERMITTED -- requires human authority + CR |
Human Override Rules
- Drift thresholds can only be modified by CM authority with documented rationale
- Intentional drift (e.g., planned terminology change) must be registered as a CR before the change, not retroactively
- False positive alerts can be suppressed per-instance with justification; pattern suppression requires CM authority
Audit Logging Requirements
- Log every scan with timestamp, scope, and per-category results
- Log every alert raised with severity, category, and affected elements
- Log every threshold modification with authority
- Log every suppression with justification
- Retain drift trend data for minimum 12 months
4. Impact Analysis Agent
Purpose: Compute and present the full impact chain of proposed or detected changes.
Inputs
| Input | Source | Format |
|---|
| Change Request | CR workflow | CR record with proposed change detail |
| Traceability graph | Traceability engine | Directed graph of element relationships |
| Baseline registry | CM system | Current and historical baselines |
| Domain model | Domain model registry | Canonical model with relationships |
| Dependency maps | Build/deployment system | Artefact dependency graph |
Outputs
| Output | Consumer | Format |
|---|
| Impact report | CCB, CR requestor, CM team | Structured report (direct + transitive impacts) |
| Risk assessment | CCB, Risk manager | Impact-severity matrix |
| Alternative analysis | CCB | Scored option comparison |
| Effort estimate | Project management | Estimated scope of change |
| Affected artefact list | Artefact owners | Notification list |
Decision Authority
| Action | Authority Level |
|---|
| Compute impact chain | Autonomous |
| Score impact severity | Autonomous |
| Generate alternatives | Autonomous |
| Recommend preferred alternative | Autonomous (recommendation only) |
| Approve change | NOT PERMITTED -- routes to CCB |
| Modify scope of analysis | NOT PERMITTED -- scope set by CR |
Human Override Rules
- Humans may request expanded or narrowed analysis scope
- Alternative recommendations are advisory; selection is human authority only
- Impact severity scores may be overridden by CCB with documented rationale
Audit Logging Requirements
- Log every impact analysis with CR reference, scope, and results
- Log every alternative generated with scoring rationale
- Log every human override of severity scores
- Link all logs to the originating CR
5. Gate Reconciliation Agent
Purpose: Execute comprehensive reconciliation checks at stage-gate boundaries and produce gate readiness assessments.
Inputs
| Input | Source | Format |
|---|
| Gate definition | Lifecycle model | Gate criteria, required artefacts, thresholds |
| Artefact registry | CM system | All managed artefacts with status |
| Consistency results | Artefact Consistency Auditor | Latest consistency matrix |
| Drift results | Drift Detection Agent | Latest drift scores |
| Traceability status | Traceability engine | Completeness percentages |
| Open CRs | CR workflow | List of open CRs with status |
| Open incidents | Incident system | List of open incidents |
Outputs
| Output | Consumer | Format |
|---|
| Gate readiness report | CCB | Structured checklist with pass/warn/fail per criterion |
| Reconciliation evidence pack | CCB, Compliance | Aggregated evidence from all checks |
| Block/proceed recommendation | CCB | Advisory recommendation with rationale |
| Deficiency list | Artefact owners, CM team | Itemised list of gaps with remediation guidance |
| Gate decision record | Audit trail | Decision, authority, conditions, timestamp |
Decision Authority
| Action | Authority Level |
|---|
| Execute all gate checks | Autonomous |
| Produce readiness report | Autonomous |
| Recommend block/proceed | Autonomous (recommendation only) |
| Approve gate passage | NOT PERMITTED -- requires CCB authority |
| Grant override/waiver | NOT PERMITTED -- requires CCB or Program Director |
| Modify gate criteria | NOT PERMITTED -- requires lifecycle governance authority |
Human Override Rules
- Gate passage decision is exclusively human (CCB or designated authority)
- CCB may approve with conditions (documented as risk acceptance)
- Conditional approval must specify: conditions, deadline, responsible party, consequence of non-compliance
- Override of a
fail status requires escalation path per FR-C05
Audit Logging Requirements
- Log complete gate check execution with all input data references
- Log every criterion result (pass/warn/fail) with supporting evidence
- Log the gate decision (approved/blocked/conditional) with authority
- Log all conditions attached to conditional approvals
- Log condition fulfilment or violation at subsequent checkpoints
Common Agent Governance Rules
Separation of Duties
- No single agent may both propose and approve a configuration change
- Agents that detect issues (Drift Detection, Consistency Auditor) must not also remediate them
- The Configuration Manager Agent orchestrates but does not override other agents' findings
Fail-Safe Behaviour
- If an agent cannot complete its analysis, it shall report
incomplete (not pass)
incomplete status blocks gate progression the same as fail
- Agent failures shall be logged as operational incidents
Inter-Agent Communication
- Agents communicate through the shared baseline registry and event bus
- No direct agent-to-agent modification of state
- All inter-agent data exchange is logged and auditable
Human Escalation Triggers
Any agent shall escalate to human authority when:
- A decision exceeds its authority level
- Contradictory results are produced by multiple agents
- An anomaly falls outside configured detection rules
- Resource constraints prevent timely analysis completion