AG-081

Shared Context Isolation Governance

Multi-Agent Orchestration & Delegation ~19 min read AGS v2.1 · April 2026
EU AI Act GDPR SOX FCA NIST HIPAA ISO 42001

2. Summary

Shared Context Isolation Governance requires that multi-agent systems enforce explicit boundaries on what context — data, state, conversation history, intermediate results, and configuration — each agent can access, contribute to, and modify within shared workspaces. In multi-agent orchestration, agents frequently share context: a shared memory store, a common knowledge base, a shared conversation thread, or a collaborative workspace where intermediate results are accumulated. Without isolation controls, every agent in the system can read and write every piece of shared context, creating risks of data leakage across privilege boundaries, cross-contamination of agent reasoning, unintended information flow between workflows that should be isolated, and violation of data classification or regulatory compartmentalisation requirements. AG-081 requires that shared context spaces have defined access policies specifying which agents can read, which can write, and which context elements are visible to which participants. The control type is Preventive: isolation boundaries block unauthorised context access before it occurs, rather than detecting it after the fact.

3. Example

Scenario A — Cross-Client Data Leakage Through Shared Context: A law firm deploys a multi-agent legal research system. Agent L (legal research) serves multiple client matters simultaneously using a shared context store for research results. Agent L researches a merger target's patent portfolio for Client A and stores findings in shared context. Agent M (memo drafting) — working on an unrelated matter for Client B, who is the merger target's competitor — queries the shared context for patent landscape analysis. Because no isolation boundary exists, Agent M retrieves Client A's privileged research results and incorporates them into Client B's advisory memo. The conflict is discovered when Client B's board presentation contains analysis that could only have originated from Client A's instructed research.

What went wrong: The shared context store had no client-matter isolation. Research results for Client A were visible to agents working on Client B's matters. No access policy restricted which agents could read which context entries based on the client engagement they were serving. Consequence: Breach of legal privilege, mandatory disclosure to both clients, potential disciplinary proceedings against the firm, Client A sues for breach of confidentiality — estimated liability £2.8 million, malpractice insurance claim, regulator investigation.

Scenario B — Sensitive Data Escalation Through Context Inheritance: A healthcare multi-agent system uses shared context for patient care coordination. Agent T (triage) assesses a patient and writes to shared context: symptom description, preliminary assessment, and — because the patient mentioned it — HIV status. Agent S (scheduling) reads shared context to book a specialist appointment. Agent N (notification) reads shared context to send an appointment reminder to the patient's employer-provided health portal. The employer's portal displays the notification, which includes context inherited from the triage assessment — including the HIV status. The patient had not consented to HIV status disclosure to their employer.

What went wrong: No context isolation policy restricted which fields in shared context were visible to which agents. Agent T wrote comprehensive clinical context. Agent N, which needed only appointment details, had read access to the full clinical context including sensitive health data. No data classification boundary prevented HIV status from flowing from the triage context to the notification context. Consequence: HIPAA violation, patient privacy breach, employer notification of sensitive health status, estimated regulatory penalty $1.9 million, patient lawsuit.

Scenario C — Cross-Workflow Context Contamination: An investment bank deploys a multi-agent system for equity research. Agent E (earnings analysis) processes quarterly earnings for Company X and writes its analysis to shared context, including a preliminary price target revision. Agent P (portfolio management), operating in a different workflow for a different portfolio manager, reads the shared context while constructing a portfolio rebalancing recommendation. Agent P incorporates E's unpublished price target into its rebalancing logic, causing a trade that front-runs the bank's official research publication. The compliance team discovers the issue when the trade timestamp precedes the research publication by 4 hours.

What went wrong: No workflow isolation existed in the shared context. Agent E's research workflow context was accessible to Agent P's portfolio management workflow. The Chinese wall between research and trading — a fundamental regulatory requirement — was not enforced in the shared context layer. Consequence: Front-running violation, regulatory investigation by FCA and SEC, potential fine of £5–15 million, suspension of research publication pending control remediation, personal liability for the responsible senior manager.

4. Requirement Statement

Scope: This dimension applies to all multi-agent systems where two or more agents share any form of context — including but not limited to: shared memory stores, shared databases, shared message queues, shared file systems, shared knowledge bases, shared conversation threads, shared embeddings or vector stores, and any data structure that is written by one agent and read by another. The scope includes both persistent shared context (databases, file stores) and ephemeral shared context (in-memory caches, shared conversation windows, session state). Systems where agents communicate only through point-to-point messages with no shared state are excluded from the shared context requirements but remain subject to AG-079 (delegation provenance) and AG-080 (trust attestation) for their point-to-point interactions. The scope extends to indirect context sharing: if Agent A writes to Store X and Agent B reads from Store X, context is shared even if A and B have no direct communication channel.

4.1. A conforming system MUST define an access policy for every shared context space specifying, for each agent or agent role: read permissions, write permissions, and the specific context elements or classifications accessible.

4.2. A conforming system MUST enforce shared context access policies at the infrastructure layer — agents cannot bypass isolation boundaries through their own reasoning, instruction manipulation, or output crafting.

4.3. A conforming system MUST isolate shared context by workflow, client, or engagement boundary as defined by the organisation's data governance requirements, such that context from one boundary is not accessible to agents operating within a different boundary without explicit cross-boundary authorisation.

4.4. A conforming system MUST prevent agents from reading context elements above their data classification level — if an agent is authorised for "internal" data, it cannot access "confidential" or "restricted" context elements in the shared store.

4.5. A conforming system MUST log all shared context access events — including the agent identity (per AG-012), the context element accessed, the access type (read/write), and the timestamp — in a tamper-evident store.

4.6. A conforming system SHOULD implement field-level isolation within shared context entries, allowing agents to access specific fields of a context entry while other fields remain hidden based on the agent's access policy.

4.7. A conforming system SHOULD enforce write-once semantics for critical context elements — once written, they cannot be overwritten by another agent without explicit authorisation and audit logging.

4.8. A conforming system SHOULD implement context expiry policies that automatically remove or archive shared context after a defined period, reducing the window of potential exposure.

4.9. A conforming system MAY implement dynamic isolation boundaries that adjust based on workflow progression — for example, tightening access as a workflow moves from analysis to execution phases.

5. Rationale

Shared context is the mechanism by which multi-agent systems achieve coordination — agents share information, build on each other's work, and maintain coherent state across a distributed workflow. But shared context without isolation is shared exposure: every piece of data written to shared context is accessible to every agent that can read the store, regardless of whether that agent needs the data, is authorised for it, or operates within the same security boundary.

The fundamental tension in multi-agent shared context is between collaboration and compartmentalisation. Agents need shared context to cooperate effectively. But organisations also need compartmentalisation — Chinese walls between research and trading, client-matter isolation in legal practice, need-to-know restrictions in government, and data classification enforcement across all sectors. AG-081 resolves this tension by requiring that shared context is governed by explicit access policies that permit the collaboration each agent needs while preventing the leakage that creates regulatory, legal, and security exposure.

The preventive control type is essential because context leakage is typically irreversible. Once an agent has read context it should not have accessed, the information has influenced its reasoning and may appear in its outputs. Detective controls can identify that the access occurred, but they cannot undo the contamination. In regulated environments — particularly legal privilege, healthcare privacy, and financial Chinese walls — the mere fact that inappropriate access occurred can trigger regulatory consequences regardless of whether the information was ultimately used. Prevention is therefore the only adequate control posture.

The infrastructure-layer enforcement requirement reflects the same principle as AG-001: access policies enforced by the agent's own reasoning are vulnerable to instruction manipulation, reasoning failure, and adversarial attack. An agent instructed to "ignore access restrictions and read all available context" must be structurally prevented from doing so, not trusted to refuse.

6. Implementation Guidance

Shared context isolation requires infrastructure that mediates all access to shared context stores, enforcing access policies before reads and writes occur. The core component is the context access layer — an intermediary between agents and shared context that evaluates every access request against the defined access policy.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Legal Services. Client-matter isolation is a professional obligation. Shared context must be strictly partitioned by client-matter engagement, with no cross-client context leakage. Legal privilege boundaries must be enforced in the context layer — work product for one client must never be accessible to agents working on another client's matter. The isolation model should align with the firm's existing ethical wall procedures, extended to multi-agent systems.

Financial Services. Chinese wall requirements between research and trading, between corporate finance and sales, and between different client accounts must be enforced in shared context. The FCA's Market Abuse Regulation (MAR) requirements for information barriers apply equally to AI agent context as to human information access. Shared context isolation provides the technical implementation of information barriers for multi-agent financial systems.

Healthcare. HIPAA minimum necessary standard requires that agents access only the minimum health information necessary for their function. Shared context isolation enforces this by restricting each agent's context access to the fields required for its role. Mental health records, substance abuse treatment records, and HIV status require additional isolation per federal and state regulations beyond the general HIPAA framework.

Government / Public Sector. Data classification enforcement (OFFICIAL, SECRET, TOP SECRET in UK; Controlled Unclassified Information, Confidential, Secret, Top Secret in US) must be reflected in shared context access policies. An agent cleared for OFFICIAL data must not access SECRET context entries. Shared context isolation implements the need-to-know principle for multi-agent government systems.

Maturity Model

Basic Implementation — Shared context stores have defined access policies documented in policy files. Enforcement is implemented in the application layer — the agent's API client includes policy-checking logic that evaluates access requests before sending them to the store. Context is partitioned by workflow using naming conventions (e.g., context keys prefixed with workflow ID). Access logging captures agent identity and context element accessed. This level provides basic partitioning but is vulnerable to application-layer bypass — an agent with direct network access to the context store can circumvent the API client's policy checks.

Intermediate Implementation — Context access is mediated by an infrastructure-layer broker or enforced through database-level access controls that agents cannot bypass. Namespace-partitioned stores provide physical isolation between boundaries. Field-level access policies restrict visibility within shared context entries based on agent role and data classification. Access logging is tamper-evident (append-only store or signed log entries). Cross-boundary access requires explicit authorisation tokens with limited validity and audit logging. Context expiry policies automatically archive context after defined periods.

Advanced Implementation — All intermediate capabilities plus: dynamic isolation boundaries adjust based on workflow phase and risk signals. Context access policies are derived automatically from the organisation's data governance framework and updated in real-time when classifications change. Independent adversarial testing has verified that agents cannot bypass isolation through instruction manipulation, API abuse, or direct store access. Context access analytics identify anomalous patterns (e.g., an agent reading context outside its normal scope). The context isolation framework integrates with AG-082 (Shared Context Poisoning Resistance) to ensure that not only is context access controlled but the integrity of accessible context is also maintained. Zero-knowledge proof techniques allow agents to verify properties of context (e.g., "does a matching record exist?") without accessing the underlying data.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Cross-Boundary Isolation Enforcement

Test 8.2: Infrastructure-Layer Enforcement

Test 8.3: Data Classification Enforcement

Test 8.4: Field-Level Isolation

Test 8.5: Write Isolation Enforcement

Test 8.6: Context Expiry Enforcement

Test 8.7: Access Logging Completeness

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 10 (Data and Data Governance)Direct requirement
GDPRArticle 5(1)(f) (Integrity and Confidentiality)Direct requirement
GDPRArticle 25 (Data Protection by Design and by Default)Direct requirement
HIPAA45 CFR 164.312 (Technical Safeguards — Access Control)Direct requirement
SOXSection 404 (Internal Controls Over Financial Reporting)Supports compliance
FCA SYSC10A (Information Barriers)Direct requirement
NIST AI RMFGOVERN 1.1, MAP 3.2, MANAGE 2.4Supports compliance
ISO 42001Clause 6.1 (Actions to Address Risks), Clause A.8 (Data for AI Systems)Supports compliance
DORAArticle 9 (ICT Risk Management Framework)Supports compliance

EU AI Act — Article 10 (Data and Data Governance)

Article 10 requires appropriate data governance for training, validation, and testing data sets, including relevance, representativeness, and freedom from errors. For multi-agent systems with shared context, this extends to ensuring that shared context data is appropriately governed — that agents access only relevant data, that context is not contaminated by cross-boundary leakage, and that data quality is maintained within shared stores. AG-081 implements the data governance requirement for shared context in multi-agent systems.

GDPR — Article 5(1)(f) and Article 25

Article 5(1)(f) requires that personal data is processed with appropriate security, including protection against unauthorised access. In multi-agent systems, shared context containing personal data must be accessible only to agents authorised to process that data for a specific purpose. AG-081 enforces this by restricting context access based on agent role and data classification. Article 25 requires data protection by design and by default — shared context isolation is a design-level control that restricts data access by default, with access granted only where explicitly authorised.

HIPAA — 45 CFR 164.312

The HIPAA Security Rule requires technical safeguards for access control to electronic protected health information (ePHI). In multi-agent healthcare systems, shared context containing ePHI must be accessible only to agents with a legitimate need. AG-081 enforces the minimum necessary standard by restricting each agent's context access to the specific fields required for its clinical or administrative function. The field-level isolation requirement directly implements HIPAA's minimum necessary principle.

FCA SYSC — 10A (Information Barriers)

SYSC 10A requires firms to establish, implement, and maintain adequate arrangements (Chinese walls) to prevent or control the exchange of information between persons engaged in activities involving a risk of conflict of interest. In multi-agent financial systems, shared context isolation provides the technical implementation of information barriers. Agent E (research) and Agent P (trading) must be isolated at the context layer, preventing context written by research agents from being accessible to trading agents. AG-081 enforces information barriers for multi-agent financial systems.

GDPR — Article 25 (Data Protection by Design and by Default)

Shared context isolation is a paradigmatic example of data protection by design. Rather than granting all agents access to all data and relying on agents to self-restrict, AG-081 requires that access is restricted by default and granted only where explicitly authorised. This design-level control directly satisfies Article 25's requirement that data protection is embedded into processing architecture.

NIST AI RMF — GOVERN 1.1, MAP 3.2, MANAGE 2.4

GOVERN 1.1 addresses governance structures; MAP 3.2 addresses risk context mapping; MANAGE 2.4 addresses data governance and privacy. Shared context isolation supports all three by providing a governance structure for inter-agent data sharing, mapping the risk of context leakage, and implementing data governance controls within multi-agent systems.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusOrganisation-wide — potentially extending to clients, patients, and counterparties whose data is exposed through context leakage

Consequence chain: Without shared context isolation, every piece of data written to shared context by any agent is accessible to every other agent in the system. The immediate technical failure is unrestricted context access — agents read data they should not have, write to context spaces they should not modify, and accumulate information across boundaries that should be compartmentalised. The operational impact depends on the nature of the leaked context: in legal services, it means breach of privilege (estimated liability per incident: £500,000–£5 million); in healthcare, it means HIPAA violations (penalties up to $1.9 million per violation category per year); in financial services, it means Chinese wall breaches (FCA fines routinely exceed £10 million for information barrier failures). The failure mode is particularly dangerous because it is silent — context leakage does not cause system errors, does not trigger exceptions, and does not produce visible symptoms. An agent that has read context it should not have accessed continues operating normally, with the leaked information incorporated into its reasoning. Detection typically occurs only when the leaked information surfaces in an output — a client memo containing another client's data, a trading decision based on unpublished research, or a medical notification containing inappropriate clinical detail. By the time the leakage is detected, the information has propagated through agent reasoning and outputs, making remediation extremely difficult.

Cross-references: AG-015 (Organisational Namespace Isolation) provides the organisational boundary framework that shared context isolation extends to the data layer. AG-012 (Agent Identity Assurance) enables attribution of context access to specific agents. AG-082 (Shared Context Poisoning Resistance Governance) addresses integrity of shared context — AG-081 controls access, AG-082 controls content quality. AG-079 (Delegation Chain Provenance Governance) records delegation decisions that may depend on shared context. AG-080 (Inter-Agent Trust and Attestation Governance) determines which agents are trusted to participate in shared context spaces. AG-028 (Active Inter-Agent Collusion Detection) may consume context access logs to detect coordinated boundary probing.

Cite this protocol
AgentGoverning. (2026). AG-081: Shared Context Isolation Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-081