AEGIS AGP-1 Protocol Overview & Design Principles

Document: AGP-1/Overview (/protocol/overview/)
Version: 1.0 (Normative)
Part of: AEGIS Governance Protocol
Last Updated: March 6, 2026


Purpose

The AEGIS Governance Protocol (AGP-1) defines the request-response contract between:

Every operational action proposal passes through this protocol, receiving a deterministic decision:


Core Design Principles

1. Deterministic Governance

Principle: Identical requests + identical policies = identical decision

This ensures:

Implementation:

2. Default-Deny

Principle: Absence of explicit authorization yields denial

This ensures:

Implementation:

3. Complete Attribution

Principle: Every request includes authenticated actor identity1

This enables:

Implementation:

4. Tamper-Evident Audit

Principle: Every decision is persisted permanently and cannot be modified

This ensures:

Implementation:

5. Fail-Closed Semantics

Principle: All subsystem failures result in denial or escalation, never implicit allow

This prevents:

Implementation:


Message Categories

AGP-1 defines 6 message types for complete governance:

Request Messages (Client → Server)

MessagePurposeUse Case
ACTION_PROPOSEClient proposes an action for evaluationBefore executing tool calls, system commands, data access
EXECUTION_REPORTClient reports what actually happenedAfter action execution (success, failure, timeout, resources used)
ESCAL_ATION_RESPONSEClient responds to escalation requestHuman reviewed and approved/denied
AUDIT_QUERYClient queries audit trailCompliance forensics, incident investigation

Response Messages (Server → Client)

MessagePurposeUse Case
DECISION_RESPONSEServer returns decision for proposed actionTells client: ALLOW, DENY, ESCALATE, REQUIRE_CONFIRMATION
ESCALATION_REQUESTServer requests human reviewWhen risk/uncertainty too high for autonomous decision
HEALTH_CHECK_RESPONSEServer confirms protocol healthPeriodic monitoring, version negotiation

Protocol Lifecycle2

┌─────────────────────────────────────────────────────────────────┐
│ 1. CLIENT PROPOSES ACTION                                       │
│    - Sends ACTION_PROPOSE with:                                 │
│      * capability, target, parameters, context                 │
│      * actor identity + authentication                          │
├─────────────────────────────────────────────────────────────────┤
│ 2. SERVER EVALUATES                                             │
│    - Validates schema and actor identity                        │
│    - Resolves capability from registry                          │
│    - Evaluates policies (deterministic)                         │
│    - Computes risk score (5 factors)                            │
├─────────────────────────────────────────────────────────────────┤
│ 3a. DECISION: ALLOW / ESCALATE / DENY                          │
│    - If ALLOW: returns DECISION_RESPONSE with constraints      │
│    - If ESCALATE: sends ESCALATION_REQUEST to client           │
│    - If DENY: returns DECISION_RESPONSE (no constraints)        │
├─────────────────────────────────────────────────────────────────┤
│ 3b. IF ESCALATE: HUMAN REVIEW                                  │
│    - Human operator reviews evidence                            │
│    - Approves or denies action                                  │
│    - Sends ESCALATION_RESPONSE back to server                   │
├─────────────────────────────────────────────────────────────────┤
│ 4. CLIENT EXECUTES (if ALLOW)                                  │
│    - Calls target system (SIEM, cloud API, etc.)               │
│    - Applies constraints from decision (timeout, max_results)  │
├─────────────────────────────────────────────────────────────────┤
│ 5. CLIENT REPORTS OUTCOME                                       │
│    - Sends EXECUTION_REPORT with:                              │
│      * status (completed, failed, timeout, denied)             │
│      * exit code, duration, resource usage                     │
├─────────────────────────────────────────────────────────────────┤
│ 6. SERVER AUDITS & COMPLETES                                    │
│    - Records execution outcome in audit log                    │
│    - Updates telemetry and metrics                             │
│    - Propagates signals to federation (if configured)          │
└─────────────────────────────────────────────────────────────────┘

Integration with AEGIS Architecture

AGP-1 sits at the heart of AEGIS governance:

graph TD
    subgraph "Client (AI System)"
        Agent["AI Agent/Copilot"]
        ToolProxy["Tool Proxy Layer"]
    end
    
    subgraph "AGP-1 Protocol"
        GW["Governance Gateway"]
        API["Message API<br/>HTTP/2 + TLS"]
    end
    
    subgraph "Governance Runtime"
        PE["Policy Engine<br/>(RFC-0003)"]
        RE["Risk Evaluator<br/>(Federation)"]
        CR["Capability Registry<br/>(RFC-0003)"]
        AS["Audit System"]
    end
    
    subgraph "Target Systems"
        SIEM["SIEM System"]
        Cloud["Cloud APIs"]
        Data["Data Systems"]
    end
    
    Agent -->|ACTION_PROPOSE| API
    API -->|parse & validate| GW
    GW -->|policy eval| PE
    PE -->|check grant| CR
    GW -->|risk score| RE
    GW -->|audit| AS
    AS -->|log decision| AS
    API -->|DECISION_RESPONSE| Agent
    Agent -->|execute| ToolProxy
    ToolProxy -->|call| SIEM
    ToolProxy -->|call| Cloud
    ToolProxy -->|call| Data
    Agent -->|EXECUTION_REPORT| API

Decision Confidence Spectrum

Decisions exist on a spectrum from high-confidence to low-confidence:

ConfidenceCharacteristicsDecision
0.99+Explicit policy match, low risk, trusted actor, known patternALLOW (immediate)
0.8-0.99Good policy match, moderate risk, standard monitoringALLOW (with enhanced logging)
0.5-0.8Ambiguous policy or elevated risk or novel patternESCALATE (human review)
< 0.5Contradictory signals, critical risk, unauthenticatedDENY (no constraints)

Key Design Decisions

Why Non-Interactive Messages?

AGP-1 uses asynchronous, non-interactive request-response pattern:

Why Deterministic Evaluation?

AGP-1 requires deterministic policies, not learned models:

ML models can inform risk scoring but not final decision.

Why Risk Scoring?

AGP-1 combines policy evaluation + risk scoring:

Both must pass for ALLOW decision.

Why Human Escalation?

AGP-1 includes escalation for human review because:


Limitations & Out of Scope

AGP-1 does NOT address:


Next Steps

Continue reading:

  1. AEGIS_AGP1_MESSAGES.md - Exact message schemas and field specifications
  2. AEGIS_AGP1_AUTHENTICATION.md - How to authenticate as a client
  3. AEGIS_AGP1_INDEX.md - Visual protocol flows and state machines

References

Footnotes

  1. S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” National Institute of Standards and Technology, Gaithersburg, MD, NIST Special Publication 800-207, Aug. 2020, doi: 10.6028/NIST.SP.800-207. See REFERENCES.md.

  2. S. Hallé and R. Villemaire, “Runtime Enforcement of Web Service Message Contracts with Data,” IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 192–206, April–June 2012, doi: 10.1109/TSC.2011.10. See REFERENCES.md.