Safety & governance
Governed copilots, not autonomous money-movers
IOF agents are governed, scoped, auditable copilots. They do not bypass IOF APIs, Cerbos policy enforcement, tenant boundaries, maker-checker, or evidence requirements. Agents can recommend, prepare, validate, and generate evidence. Sensitive actions remain approval-gated.
The hard rule
No IOF agent moves money, executes a transaction, releases a regulator filing, or commits a tenant to any action without an authenticated human approval recorded in the audit trail.
Cerbos policy enforcement
Every agent call resolves to a Cerbos decision against the same ABAC policies that bind human principals. No agent can request a resource its principal cannot access. Decisions are logged to the audit trail with full attribute snapshots.
Maker-checker preserved
Approval-gated actions stay approval-gated. Agents can prepare, draft, and recommend, but the second human signature remains a hard requirement. We never short-circuit two-person controls.
Tenant boundaries enforced
Agent calls inherit the calling principal's tenant_id. Cross-tenant traversal is structurally impossible — denied at the API gateway, the policy engine, and the database (row-level security).
Evidence-tagged outputs
Every agent output carries a manifest: data lineage, model + version, prompt hash, retrieval set, decision log. Reproducible, signed, and admissible to auditors. No ungrounded answers.
Bounded by IOF APIs
Agents call IOF rails through the same authenticated, rate-limited, observable APIs as any other client. There is no privileged backdoor — agents are first-class principals subject to the same controls.
Conservative by default
Where the agent is uncertain, it abstains and surfaces the uncertainty with a structured confidence score. We prefer a clear 'I cannot determine this' over a confident hallucination.
Engineered for
AAOIFIIFSBEU AI Act (Annex III)SOC 2 Type IIGDPRPSD2 SCAISO 27001ISO 20022Basel IIIBCBS 239FATFMiCADORA
Including EU AI Act Annex III high-risk obligations: documented risk management, data governance, human oversight, accuracy / robustness, cyber-security, and post-market monitoring.