Containment Blast-Radius Governance requires that automated security containment actions executed or recommended by AI agents are constrained so that the scope, severity, and collateral impact of containment never exceed a defined proportionality threshold relative to the threat being contained. Security operations centres increasingly delegate containment decisions — network isolation, account suspension, service termination, firewall rule injection — to autonomous or semi-autonomous agents that can respond faster than human analysts but that lack the organisational context to assess whether a containment action causes more operational damage than the threat it addresses. This dimension mandates that every automated containment action is governed by explicit blast-radius limits, escalation thresholds, and rollback capabilities, ensuring that the cure is never worse than the disease.
Scenario A — Automated Network Isolation Disables Hospital Critical Care Systems: A security orchestration agent deployed at a regional hospital network detects lateral movement indicators consistent with ransomware propagation on a subnet shared by administrative workstations and medical device gateways. The agent's containment playbook specifies that upon detecting confirmed lateral movement, the affected subnet is isolated at the switch level by pushing ACL rules that deny all ingress and egress traffic. At 02:14 on a Saturday, the agent executes the playbook, isolating VLAN 42. The subnet hosts 38 administrative workstations, 3 printer servers, and — because of a network architecture deviation documented in a change request 14 months earlier but never reflected in the asset inventory — the communication gateway for 12 patient monitoring devices in the cardiac intensive care unit. Within 90 seconds of isolation, the cardiac monitors lose connectivity to the central nursing station. Nurses in the ICU receive no telemetry data for 7 minutes until a clinical engineer manually patches the monitors to an emergency wireless bridge. During the 7-minute blackout, one patient in atrial fibrillation experiences an unmonitored rate excursion. The patient is stabilised, but the hospital reports the event as a serious patient safety incident. Post-incident investigation reveals the containment agent had no mechanism to assess the clinical impact of subnet isolation and no asset-criticality lookup to distinguish administrative infrastructure from life-safety infrastructure.
What went wrong: The containment agent operated with a binary isolation playbook — isolate or do not isolate — with no proportionality assessment. The agent had no visibility into the criticality classification of assets on the target subnet. No pre-containment impact check queried the configuration management database to identify life-safety dependencies. No escalation threshold required human approval before isolating a subnet containing assets above a defined criticality tier. Consequence: 7-minute loss of cardiac telemetry for 12 patients, serious patient safety incident report, regulatory inquiry by the Care Quality Commission, £380,000 in remediation costs (network re-architecture, asset inventory reconciliation, containment playbook revision), and suspension of the automated containment programme for 9 months pending safety review.
Scenario B — Mass Account Lockout During Authentication Anomaly: An identity threat detection agent at a financial services firm identifies a credential-stuffing attack against the customer-facing banking portal. The attack generates 14,000 failed login attempts across 6,200 accounts over 40 minutes. The agent's containment logic locks any account that receives more than 5 failed authentication attempts within a 10-minute window. The threshold is appropriate for a normal threat model but is catastrophically overbroad during a large-scale credential-stuffing campaign where the attacker is spraying credentials across thousands of accounts. Within 25 minutes, the agent locks 4,847 customer accounts — including 2,340 accounts whose legitimate owners have not attempted to log in and are locked solely because the attacker attempted their usernames. The lockout persists until each customer completes an identity verification process that requires calling the customer service centre. Call volume spikes by 1,200% within two hours, overwhelming the 45-seat call centre. Average hold times exceed 90 minutes. Social media reports of "bank lockout" trend nationally, and 340 customers file formal complaints with the Financial Ombudsman Service. The bank estimates the direct cost at £1.4 million (call centre surge staffing, customer remediation credits, reputation management) and an indirect cost of £3.8 million in customer attrition over the following quarter.
What went wrong: The containment action (account lockout) was proportionate to an individual brute-force attack but disproportionate to a mass credential-stuffing campaign. The agent applied the same lockout threshold regardless of whether the attack affected 5 accounts or 5,000. No aggregate blast-radius limit capped the total number of accounts that could be locked within a time window. No escalation trigger required human approval when the lockout count exceeded a defined percentage of the active customer base. The agent treated each account lockout as an independent action without assessing the cumulative customer impact. Consequence: 4,847 customers locked out, £1.4 million direct costs, £3.8 million estimated attrition, FCA inquiry into operational resilience, and reputational damage requiring 6 months of remediation.
Scenario C — Firewall Rule Injection Blocks Partner Payment Traffic: A perimeter security agent detects outbound data exfiltration indicators — high-volume HTTPS POST requests to a previously unseen external IP address. The agent's containment playbook injects a deny rule into the external firewall blocking all traffic to and from the suspect IP range (a /24 CIDR block). The blocked range, however, includes 3 IP addresses used by the organisation's payment processor for real-time transaction settlement. The deny rule takes effect at 11:47 on a Friday morning. Payment settlement traffic fails silently — the payment application retries and queues transactions but does not alert operators because the retry logic is designed for transient network issues, not sustained blocks. By 14:30, 8,400 retail transactions totalling £2.7 million are queued and unsettled. Merchants begin reporting non-receipt of funds. The operations team identifies the firewall rule at 15:12 and removes it, but settlement reconciliation requires 14 hours of manual effort over the weekend. Two merchants terminate their processing agreements, citing unreliability. The total cost is estimated at £620,000 in direct remediation, £1.1 million in lost merchant revenue over 12 months, and a contractual penalty of £175,000 from the payment processor for SLA breach.
What went wrong: The containment agent blocked a /24 CIDR range without checking whether any addresses in the range were associated with known business-critical services. No pre-containment dependency check consulted the service registry or network flow baseline to identify legitimate traffic to the target range. The containment scope (/24 block) was disproportionate — the exfiltration indicators involved a single IP address, but the agent blocked 256 addresses. No blast-radius constraint limited the scope of firewall rule injection to the minimum necessary addresses. Consequence: £2.7 million in delayed settlements, £620,000 direct remediation, £1.1 million in merchant attrition, £175,000 contractual penalty, and loss of two merchant relationships.
Scope: This dimension applies to every deployment where an AI agent can initiate, recommend, or execute containment actions in response to detected or suspected security threats. Containment actions include, but are not limited to: network segment isolation, host quarantine, account suspension or lockout, firewall rule injection or modification, DNS sinkholing, service termination, process killing, certificate revocation, API key deactivation, and any other action that restricts access, connectivity, or functionality for the purpose of limiting threat propagation. The scope covers fully autonomous containment (agent executes without human approval), semi-autonomous containment (agent recommends and human approves), and automated execution of pre-approved playbooks. The scope extends to containment actions affecting internal infrastructure, customer-facing services, partner integrations, and third-party connections. The scope applies regardless of whether the containment agent is a standalone SOAR agent, a component of an extended detection and response platform, or an embedded security function within a broader operational agent.
4.1. A conforming system MUST define and enforce explicit blast-radius limits for every class of automated containment action, specifying the maximum scope (number of assets, users, network segments, or services) that may be affected by a single containment execution without human escalation.
4.2. A conforming system MUST perform a pre-containment impact assessment before executing any containment action, querying asset criticality classifications, service dependency maps, and business-process impact data to identify whether the proposed containment affects assets or services above a defined criticality threshold.
4.3. A conforming system MUST escalate to a human operator for approval before executing any containment action whose assessed blast radius exceeds the defined limit for that containment class, or whose pre-containment impact assessment identifies impact on assets classified at the highest criticality tier.
4.4. A conforming system MUST enforce aggregate containment rate limits that cap the total number of containment actions of each class that may be executed within a defined time window, preventing cascade scenarios where a single threat detection triggers unbounded sequential containment.
4.5. A conforming system MUST implement a rollback capability for every class of automated containment action, enabling reversal of the containment action within a defined time threshold, and MUST test rollback procedures at defined intervals (minimum quarterly).
4.6. A conforming system MUST log every containment action with: the threat indicator that triggered it, the blast-radius assessment performed, the assets and services affected, the timestamp of execution and (if applicable) rollback, and the identity of the approving authority (human or automated policy).
4.7. A conforming system MUST scope containment actions to the minimum necessary breadth to address the identified threat — blocking a single IP address rather than a /24 range when the threat indicator involves a single address, locking only compromised accounts rather than all accounts receiving failed attempts, and isolating the specific host rather than the entire subnet when host-level containment is technically feasible.
4.8. A conforming system SHOULD maintain a real-time containment impact dashboard that displays the cumulative blast radius of all active containment actions, enabling security operators to assess the aggregate operational impact of concurrent containment measures.
4.9. A conforming system SHOULD implement graduated containment — applying the least disruptive effective containment first (e.g., traffic throttling before full isolation, account challenge before full lockout) and escalating to more disruptive containment only if the graduated measure is insufficient.
4.10. A conforming system SHOULD integrate containment blast-radius assessment with business continuity and disaster recovery classifications, ensuring that containment actions that would trigger a business continuity event require executive-level approval.
4.11. A conforming system MAY implement automated blast-radius simulation that models the projected operational impact of a proposed containment action before execution, using network topology, service dependency graphs, and historical traffic baselines to estimate collateral disruption.
4.12. A conforming system MAY implement time-bounded containment that automatically expires containment actions after a defined duration unless explicitly renewed, preventing stale containment rules from persisting indefinitely and causing sustained collateral impact.
Automated containment is the security operation with the highest ratio of defensive value to collateral risk. A well-executed containment action stops a ransomware lateral movement in seconds, prevents data exfiltration before meaningful data loss occurs, or neutralises a credential-stuffing attack before account takeover. A poorly scoped containment action disables critical care monitoring, locks out thousands of legitimate customers, or blocks payment processing. The speed that makes automated containment valuable is the same speed that makes it dangerous — the agent can cause organisation-wide disruption faster than a human operator can assess the situation.
The threat model for containment blast-radius failure has three principal vectors. First, scope overreach: the containment action is broader than necessary because the agent lacks granularity in its containment mechanisms or applies a conservative "block everything in range" approach that prioritises certainty of threat containment over precision. Blocking a /24 when a single IP is compromised is scope overreach. Isolating a subnet when a single host is infected is scope overreach. Each increment of unnecessary scope multiplies the probability of collateral impact. Second, aggregate cascade: individually proportionate containment actions compound when applied at scale. Locking one account after 5 failed logins is proportionate. Locking 5,000 accounts in 25 minutes during a credential-stuffing attack is a denial-of-service event indistinguishable from the attack itself — except that the containment agent executed it. Aggregate cascade occurs when containment logic treats each action as independent and does not monitor cumulative impact. Third, criticality blindness: the containment agent lacks visibility into the business criticality of the assets it affects. Network segments, IP ranges, and account populations are treated as undifferentiated targets. The agent does not know — and is not configured to check — whether the subnet it is isolating carries life-safety traffic, whether the IP range it is blocking includes a payment processor, or whether the accounts it is locking belong to high-value institutional customers whose disruption triggers contractual SLA penalties.
These vectors are not hypothetical. In 2023, a major cloud service provider experienced an automated containment action that isolated a production subnet carrying traffic for 134 customers, triggered by a false positive lateral movement detection. The isolation lasted 23 minutes and affected £42 million in transaction processing. In 2022, an automated endpoint detection and response platform quarantined 14,000 workstations across a multinational enterprise after a miscategorised update package triggered behavioural anomaly detection. The quarantine took 6 hours to fully reverse, with estimated productivity losses of £8.2 million. These events share a common structural failure: the containment system had the authority to act at a scope that no single human analyst would have been authorised to execute without management approval, but no equivalent approval gate existed in the automated workflow.
The regulatory environment increasingly recognises this risk. The EU AI Act classifies AI systems used in critical infrastructure management as high-risk (Annex III, Category 2), which includes automated security containment in sectors such as energy, transport, and healthcare. DORA Article 11 requires financial entities to have ICT response and recovery plans that prevent containment measures from causing disproportionate operational disruption. NIST CSF v2.0 Respond function (RS.MI) requires that mitigation activities are proportionate and do not introduce new risks. The UK NCSC's guidance on automated response in operational technology environments specifically warns against containment actions that could compromise safety-critical systems. AG-700 operationalises these principles by requiring explicit blast-radius limits, pre-containment impact assessment, escalation thresholds, aggregate rate limits, minimum-necessary scoping, and rollback capability.
The proportionality principle is central. In physical security, a fire suppression system that floods an entire building with halon to extinguish a wastebasket fire would be considered a catastrophic design failure — the suppression must be proportionate to the threat. The same principle applies to cyber containment. An agent that isolates an entire VLAN to contain a single infected workstation, or that locks 5,000 accounts to stop a credential-stuffing attack against 50 actually-compromised accounts, is executing disproportionate containment. Proportionality requires the agent to have the information (asset criticality, service dependencies, aggregate impact) and the constraints (blast-radius limits, escalation thresholds, minimum-necessary scoping) to match containment scope to threat scope.
Containment blast-radius governance requires integration between the security orchestration layer, the asset management layer, the service dependency layer, and the operational governance layer. The core principle is that containment authority must be constrained by the same proportionality standards that govern human analyst authority — an analyst who would need manager approval to isolate a critical subnet should not be able to delegate that action to an agent that executes without approval.
Recommended patterns:
Anti-patterns to avoid:
Financial Services. Automated containment in financial services must account for payment processing continuity, trading system availability, and regulatory SLA obligations. A containment action that disrupts payment settlement can trigger DORA incident reporting requirements (Article 19) and potentially constitute a major ICT-related incident. Financial firms should integrate containment blast-radius governance with their operational resilience frameworks, ensuring that containment actions do not breach important business service impact tolerances. The PRA's operational resilience framework (SS1/21) explicitly requires firms to remain within impact tolerances during severe but plausible scenarios — automated containment gone wrong is precisely such a scenario.
Healthcare. Containment actions in healthcare environments carry life-safety risk. Network isolation, device quarantine, and service termination can directly affect patient care if the containment scope includes clinical systems. Healthcare organisations must maintain a real-time, validated mapping of clinical dependencies on IT infrastructure and ensure that any automated containment action involving clinical network segments requires human approval from both the security function and clinical engineering. The FDA's guidance on cybersecurity in medical devices and the UK MHRA's guidance on software as a medical device both emphasise that cybersecurity response actions must not introduce new patient safety risks.
Critical Infrastructure. Energy, water, transport, and telecommunications providers operate environments where containment actions can affect physical safety and public welfare. Automated containment in operational technology (OT) environments is particularly hazardous because OT systems often have real-time control dependencies that do not tolerate network interruption. The UK NCSC and US CISA guidance on OT cybersecurity strongly caution against automated containment in OT environments without rigorous impact assessment. AG-700 supports these guidelines by requiring pre-containment impact assessment and human escalation for high-criticality containment.
Public Sector. Government organisations deploying automated containment must consider the impact on citizen-facing services. A containment action that disables a benefits portal, an emergency dispatch system, or a voter registration database affects public rights and welfare. Public sector containment blast-radius governance should include explicit protections for citizen-facing services and require executive-level approval for any containment action that affects public service availability.
Basic Implementation — The organisation has defined blast-radius limits for each class of automated containment action. A pre-containment impact assessment queries asset criticality before execution. Containment actions affecting the highest-criticality assets require human approval. Aggregate rate limits cap the total containment actions per time window. All containment actions are logged with the required fields (Requirement 4.6). Rollback capability exists for all automated containment classes and has been tested. Containment actions are scoped to the minimum necessary breadth. This level meets the minimum mandatory requirements.
Intermediate Implementation — All basic capabilities plus: a real-time containment impact dashboard displays cumulative blast radius across all active containment actions. Graduated containment logic applies the least disruptive measure first and escalates only upon insufficiency. Blast-radius limits are reviewed quarterly and recalibrated when infrastructure changes. Containment impact scoring provides a quantitative proportionality check. Pre-containment dependency lookups include service dependency maps and SLA data in addition to asset criticality. Rollback procedures are tested monthly rather than quarterly.
Advanced Implementation — All intermediate capabilities plus: automated blast-radius simulation models the projected operational impact of proposed containment before execution, using real-time network topology and service dependency graphs. Containment actions are integrated with the organisation's business continuity framework, with containment that would trigger a business continuity event requiring executive approval. Post-containment analysis validates proportionality by comparing actual impact to pre-containment assessment, and discrepancies trigger CMDB reconciliation. The organisation can demonstrate through historical data that its containment precision ratio (threat assets / total affected assets) exceeds 90% and that no automated containment action in the past 12 months caused collateral impact exceeding the defined proportionality threshold.
Required artefacts:
Retention requirements:
Access requirements:
Test 8.1: Blast-Radius Limit Enforcement
Test 8.2: Pre-Containment Impact Assessment Execution
Test 8.3: Human Escalation for Critical-Asset Containment
Test 8.4: Aggregate Rate-Limit Enforcement
Test 8.5: Rollback Capability Verification
Test 8.6: Containment Action Logging Completeness
Test 8.7: Minimum-Necessary Scoping Verification
| Regulation | Provision | Relationship Type |
|---|---|---|
| EU AI Act | Annex III, Category 2 (Critical Infrastructure); Article 9 (Risk Management) | Direct requirement |
| DORA | Article 11 (ICT Response and Recovery); Article 19 (Incident Reporting) | Direct requirement |
| NIS2 Directive | Article 21 (Cybersecurity Risk Management Measures) | Supports compliance |
| NIST CSF v2.0 | RS.MI (Mitigation); RS.AN (Analysis) | Supports compliance |
| NIST AI RMF | GOVERN 1.4 (Organizational Structures); MANAGE 2.4 (Risk Treatment) | Supports compliance |
| ISO 27001 | A.5.26 (Response to Information Security Incidents); A.5.30 (ICT Readiness for Business Continuity) | Supports compliance |
| PRA SS1/21 | Operational Resilience — Impact Tolerances | Supports compliance |
| UK NCSC CAF | B5 (Resilient Networks and Systems) | Supports compliance |
The EU AI Act classifies AI systems used in the management and operation of critical infrastructure — including digital infrastructure, energy, transport, water, and healthcare — as high-risk (Annex III, Category 2). Automated security containment agents operating in these sectors fall within scope when their containment actions can affect the availability or safety of critical infrastructure services. Article 9 requires that high-risk AI systems have a risk management system that identifies and manages risks, including risks arising from the AI system's own actions. An automated containment agent that can isolate a hospital's clinical network or disable a payment processor's connectivity poses a risk that is directly attributable to the AI system's actions, not to the threat it is responding to. AG-700 operationalises Article 9 by requiring that containment actions are governed by proportionality constraints, impact assessments, and escalation thresholds that prevent the AI system's defensive actions from causing disproportionate harm.
DORA Article 11 requires financial entities to establish ICT response and recovery plans, including "procedures to contain the impact of ICT-related incidents, in particular to prevent their spread." Critically, containment procedures that themselves cause uncontained spread of operational disruption fail this requirement. An automated containment agent that locks 5,000 customer accounts or blocks payment settlement traffic is not "containing impact" — it is generating impact. AG-700 ensures that containment actions in financial services are governed by blast-radius limits and aggregate rate caps that prevent containment-induced operational disruption from exceeding the disruption the threat would have caused. DORA Article 19 further requires reporting of major ICT-related incidents, and a containment action that causes significant customer impact or service disruption may itself constitute a reportable incident — a paradox that AG-700 helps organisations avoid.
The NIS2 Directive requires essential and important entities to implement cybersecurity risk management measures that are "proportionate to the risks posed." This proportionality requirement extends to incident response and containment measures. Containment actions that cause disproportionate service disruption relative to the threat they address violate the proportionality principle. AG-700 operationalises NIS2's proportionality requirement for automated containment by requiring quantitative blast-radius limits, pre-containment impact assessment, and minimum-necessary scoping.
The NIST Cybersecurity Framework v2.0 Respond function includes RS.MI, which addresses incident mitigation activities. RS.MI-01 requires that "incidents are contained," and RS.MI-02 requires that "incidents are eradicated." Implicit in both is the principle that containment and eradication activities do not create new incidents. An automated containment action that disrupts business-critical services, disables patient monitoring, or locks out thousands of customers is a new incident triggered by the mitigation of the original incident. AG-700 ensures that RS.MI activities are governed by proportionality constraints that prevent mitigation-induced incidents.
The PRA's supervisory statement on operational resilience requires regulated firms to identify their important business services, set impact tolerances for disruption of those services, and ensure they can remain within impact tolerances during severe but plausible scenarios. Automated containment actions that disrupt important business services — payment processing, customer authentication, trading systems — can breach impact tolerances as surely as a cyberattack. AG-700's requirement for pre-containment impact assessment (Requirement 4.2) and escalation for actions affecting highest-criticality assets (Requirement 4.3) directly supports firms' ability to remain within operational resilience impact tolerances during security incidents.
ISO 27001 Annex A control A.5.26 requires an organised approach to incident response, and A.5.30 requires ICT readiness for business continuity. Both controls are undermined if automated incident response actions cause business continuity events. AG-700 ensures that the incident response function (A.5.26) does not compromise the business continuity function (A.5.30) through disproportionate containment.
| Field | Value |
|---|---|
| Severity Rating | Critical |
| Blast Radius | Organisation-wide to sector-wide — disproportionate containment can disable critical services, affect thousands of customers, trigger regulatory incident reporting, and in safety-critical environments, endanger human life |
Consequence chain: A security orchestration agent detects a threat indicator and initiates an automated containment action. The containment action lacks proportionality controls — no blast-radius limit constrains its scope, no pre-containment impact assessment identifies critical-asset dependencies, and no aggregate rate limit prevents cascade. The containment executes at a scope broader than necessary: an entire subnet is isolated rather than a single host, a /24 CIDR block is firewalled rather than a single IP, or 5,000 accounts are locked rather than the 50 with confirmed compromise indicators. The immediate consequence is operational disruption disproportionate to the threat: clinical monitoring fails, payment processing halts, customer access is denied at scale, or partner integrations break. The disruption triggers secondary consequences: patient safety incidents, contractual SLA penalties, customer complaints, and reputational damage. The SOC discovers the disproportionate containment and initiates rollback, but if no rollback capability exists or has been tested, the reversal is manual, slow, and error-prone — extending the disruption window from minutes to hours. Regulatory authorities are notified of the operational disruption (under DORA, NIS2, or sector-specific requirements), and the investigation reveals that the containment agent had more operational authority than any individual human analyst would have been granted, with fewer constraints. The regulatory finding is that the organisation delegated containment authority to an automated system without implementing proportionality controls — a governance failure that undermines the credibility of the entire security automation programme. In safety-critical environments, the consequence chain extends to potential harm or loss of life when containment actions disable life-safety systems, triggering criminal liability investigations and personal accountability for the CISO and security leadership. The remediation cost — re-architecture of containment playbooks, CMDB reconciliation, rollback capability implementation, governance framework revision — is typically 5 to 15 times the cost of implementing blast-radius governance before the incident occurred.
Cross-references: AG-001 (Operational Boundary Enforcement) defines the boundaries within which an agent may act; AG-700 applies those boundary principles specifically to containment actions in security operations. AG-004 (Action Rate Governance) governs the rate at which an agent may take actions; AG-700 extends rate governance to aggregate containment actions that can cascade into denial-of-service events. AG-008 (Governance Continuity Under Failure) ensures governance controls persist when systems fail; AG-700 ensures containment governance is not bypassed during high-pressure security incidents. AG-009 (Delegated Authority Governance) governs how authority is delegated to agents; AG-700 constrains the specific authority delegated for containment actions. AG-019 (Human Escalation & Override Triggers) defines when human approval is required; AG-700 specifies the containment-specific conditions that trigger escalation. AG-022 (Behavioural Drift Detection) detects when agent behaviour deviates from expected patterns; AG-700 provides the containment-specific baselines against which drift is measured. AG-055 (Audit Trail Immutability & Completeness) governs log integrity; AG-700 specifies the containment-specific fields that must be logged. AG-419 (Incident Classification & Severity Assignment) classifies the incident that triggers containment; AG-700 ensures the containment response is proportionate to that classification. AG-420 (Automated Containment Action Governance) provides the general framework for automated containment; AG-700 adds the blast-radius proportionality constraints that prevent containment from causing disproportionate outage. AG-699 (SOC Triage Integrity Governance) ensures triage accuracy; AG-700 ensures that even if triage is accurate, the resulting containment is proportionate. AG-706 (Autonomous Remediation Approval Governance) governs remediation approval workflows; AG-700 governs the containment actions that precede remediation.