AI Governance Institute logo
AI Governance Institute

Practical Governance for Enterprise AI

Implementation Layer

AI Governance Controls

Operational controls for real-world enterprise AI systems — organized by domain, mapped to regulations, with maturity levels and implementation guidance.

54 controls across 10 domains — select a domain above to filter

HOC

Human Oversight

6 controls
AGT

Agentic AI

8 controls
AGT-001
Agenthigh

Agent Permission Boundaries

Apply least-privilege principles to AI agents by explicitly defining and enforcing the tools, APIs, data sources, and actions each agent is authorized to access.

AGT-002
Agentmedium

Agent Prompt Injection Defense

Protect AI agents from prompt injection attacks — adversarial instructions embedded in external content that hijack agent behavior.

AGT-003
Agentmedium

Agent Memory and Context Governance

Define policies governing what AI agents store in memory or persistent context, how long it is retained, who can access it, and under what conditions it is deleted.

AGT-004
Agenthigh

Multi-Agent Trust Hierarchy

Define explicit rules for which agents can instruct, invoke, or delegate authority to other agents in multi-agent systems.

AGT-005
Agentmedium

Human Approval Gate for Irreversible Agent Actions

Require explicit human approval before an AI agent takes actions that are difficult or impossible to reverse, such as sending communications, modifying records, executing transactions, or deleting data.

AGT-006
Agentmedium

Agent Action Audit Trail

Log every tool call, decision step, memory read/write, and external interaction made by an AI agent so that the full action sequence can be reconstructed after the fact.

AGT-007
Agentmedium

Agent Scope and Task Boundaries

Define and enforce the boundaries of what an AI agent is permitted to do, preventing it from expanding its activity beyond its intended purpose.

AGT-008
Agenthigh

Agent Environment Isolation

Run AI agents in isolated execution environments that limit their ability to access host systems, network resources, or data beyond what their task requires.

SEC

Security

5 controls
ALC

Audit & Logging

5 controls
CHM

Change Management

5 controls
DGC

Data Governance

5 controls
MON

Monitoring & Drift

5 controls
SAF

Safety & Reliability

5 controls
IRC

Incident Response

5 controls
PRC

Procurement

5 controls