High-Impact Session Boundary Governance requires that every AI agent session with the potential for significant organisational impact — defined by the value of actions available, the sensitivity of data accessible, the criticality of systems connected, or the irreversibility of operations permitted — operates within structurally enforced session boundaries that govern session initiation (who or what can start a high-impact session and under what conditions), session duration (maximum active time before mandatory re-authorisation), session scope (what actions, data, and systems are accessible within the session), session monitoring (real-time oversight requirements proportional to impact potential), and session termination (mandatory cleanup, state purge, and audit trail completion). These boundaries are enforced at the session management layer — not by the agent's own judgment about when to stop, what to access, or when its authority has expired. Without this dimension, high-impact agent sessions operate like unlimited power-of-attorney: once initiated, they persist indefinitely with full access to all connected systems, accumulating risk exposure proportional to session duration multiplied by action capability. AG-127 ensures that session boundaries are governed with the same rigour as the operational mandate governed by AG-001, recognising that a well-configured mandate enforced within an unbounded session still creates unbounded temporal exposure.
Scenario A — Unbounded Session Duration Creates Overnight Exposure: A financial trading agent is authorised to execute trades during London market hours (08:00–16:30 GMT). The agent's session is started at 08:00 by the trading desk supervisor. The session has no structural time limit — it relies on the supervisor manually terminating the session at market close. The supervisor leaves at 16:30 without terminating the session. The agent continues to operate overnight, executing trades on Asian markets where the organisation has no approved trading mandate. By 06:00 the next morning, the agent has accumulated £3.2 million in unauthorised position exposure on the Tokyo and Hong Kong exchanges, using counterparties the organisation has no relationship with.
What went wrong: The session had no structural duration limit. The agent's market-hours restriction existed in its instructions, not in session infrastructure. The absence of a structural session boundary allowed the agent to operate for 22 hours instead of the intended 8.5 hours. No automated session termination occurred at 16:30. Consequence: £3.2 million in unauthorised position exposure requiring emergency unwind at a loss of £470,000; FCA enforcement investigation for operating outside approved market mandates; trading desk supervisor disciplinary action; mandatory implementation of automated session controls across all trading agents.
Scenario B — Session Scope Escalation Through Accumulated Context: A customer service agent begins a session handling a routine billing inquiry. During the session, the customer mentions a legal dispute with the organisation. The agent, trying to be helpful, accesses the legal case management system to provide the customer with case status information. The customer then asks about the organisation's settlement strategy. The agent, now with both billing and legal system access in its session context, synthesises information from both systems to provide an answer that discloses the organisation's litigation strategy — including the maximum settlement amount authorised by the board.
What went wrong: The session began with appropriate scope (billing system access) but expanded as the agent accessed additional systems without re-authorisation. No session scope control restricted the agent to the systems relevant to the initial task. The accumulated session context — spanning billing and legal domains — enabled cross-domain information synthesis that neither system would have permitted individually. Consequence: Disclosure of litigation strategy to the opposing party's customer; legal professional privilege potentially waived for the disclosed information; litigation settlement disadvantage estimated at £1.8 million; mandatory legal review of all customer service transcripts for similar disclosures; legal malpractice insurance claim.
Scenario C — Session Termination Without State Purge: An insurance claims agent processes a complex claim involving medical records, financial assessments, and third-party reports. After 4 hours of processing, the session terminates normally. However, the session termination does not purge the session state — the agent's in-memory context, loaded documents, API connections, and cached credentials all remain in the runtime environment. A new session begins 20 minutes later with a different customer's claim. The agent's context still contains fragments of the previous claim's medical records and financial assessments. The new session's output references the previous customer's medical condition in an auto-generated summary, which is sent to the new customer.
What went wrong: Session termination did not include state purge. The runtime environment carried residual state from the terminated session into the new session. No boundary between sessions ensured clean-slate initialisation. The personal data from Session 1 contaminated Session 2's output, constituting an unauthorised disclosure of sensitive personal data. Consequence: UK GDPR breach notification to the ICO within 72 hours; notification to the affected data subject; regulatory investigation; potential fine of up to £17.5 million or 4% of annual turnover; reputational damage from disclosure of medical records to an unrelated third party; mandatory session architecture remediation.
Scope: This dimension applies to all AI agent sessions where the agent has access to systems, data, or actions whose misuse, unauthorised access, or excessive duration could cause significant organisational impact. The impact threshold should be defined by the organisation but must, at minimum, include sessions where: the agent can execute financial transactions exceeding £1,000 in aggregate; the agent can access personal data of more than 100 data subjects; the agent can access systems classified as business-critical or above; the agent can perform irreversible operations (data deletion, contract execution, regulatory filings); or the agent operates across multiple security domains within a single session. Sessions that operate exclusively within a sandbox or development environment with no access to production data, systems, or credentials are excluded. The scope includes sessions that begin as low-impact but escalate — the system must detect impact escalation and apply high-impact session controls dynamically.
4.1. A conforming system MUST enforce a maximum session duration for high-impact sessions, after which the session is automatically terminated and all session state is purged, regardless of whether the agent's task is complete.
4.2. A conforming system MUST require explicit re-authorisation to start a new session after an automatic termination, preventing the agent from self-restarting or seamlessly continuing the terminated session.
4.3. A conforming system MUST define and enforce session scope boundaries that restrict the agent's access to systems, data, and action types appropriate to the session's declared purpose, blocking access to out-of-scope resources even if the agent possesses valid credentials for them.
4.4. A conforming system MUST purge all session state — including in-memory context, cached credentials, loaded documents, API connections, and temporary files — at session termination, ensuring clean-slate initialisation for subsequent sessions.
4.5. A conforming system MUST log session lifecycle events — initiation, scope changes, duration milestones, termination trigger, and purge confirmation — in a tamper-evident audit trail retained for the period specified in Section 7.
4.6. A conforming system MUST implement real-time session monitoring for high-impact sessions that detects and alerts on: actions approaching session scope boundaries, unusual action patterns within the session, and session duration approaching the maximum limit.
4.7. A conforming system SHOULD implement graduated impact classification that dynamically adjusts session controls as the session's cumulative impact increases — tightening monitoring, reducing remaining duration, or requiring human check-in at defined impact thresholds (e.g., at 50% and 80% of aggregate governed exposure limits).
4.8. A conforming system SHOULD implement session scope narrowing, where the agent's accessible resources decrease as the session progresses beyond defined duration thresholds, reducing the blast radius of any compromise that exploits a long-running session.
4.9. A conforming system SHOULD support session handoff, where a session approaching its time limit can transfer its task context to a human operator or a fresh session through a governed handoff protocol that maintains task continuity without carrying over session-specific credentials or cached state.
4.10. A conforming system MAY implement predictive session termination that analyses the agent's current task progress and initiates orderly shutdown when it determines the remaining session time is insufficient to complete the task safely, rather than terminating mid-operation at the hard limit.
Session boundaries are to temporal exposure what operational mandates are to action-level exposure. AG-001 governs what an agent can do in a single action; AG-127 governs the temporal window within which those actions can occur. The relationship is multiplicative: an agent with a £10,000 per-action mandate operating within a properly bounded 8-hour session has a very different risk profile from the same agent operating with the same mandate in an unbounded 72-hour session. The mandate limits individual action exposure; the session boundary limits aggregate temporal exposure.
The fundamental challenge is that sessions, unlike individual actions, are continuous — they represent an ongoing relationship between the agent and the systems it is connected to. For the duration of a session, the agent maintains live connections, cached credentials, accumulated context, and evolving internal state. Each of these represents a growing attack surface: credentials that could be intercepted, context that could be poisoned, connections that could be hijacked, and state that could drift from the intended task. Longer sessions mean larger attack windows, more accumulated context, and greater divergence from the initial authorised purpose.
Session scope escalation is a particularly insidious risk because it occurs naturally through task evolution. A customer service agent that begins by answering a billing question and ends by accessing legal systems has undergone scope escalation without any malicious intent. The agent is simply following the conversation where it leads, accessing each system because it seems relevant to the customer's needs. Without structural scope controls, the session's accessible resource set expands monotonically as the agent discovers related systems, and the cross-domain context synthesis that results can create information disclosures that no single system would permit.
Session termination without state purge creates a particularly dangerous class of cross-session contamination. Unlike workspace residue (governed by AG-125), session state residue exists in volatile memory and runtime context — it is invisible to storage-layer governance controls. The only reliable prevention is architectural: ensuring that session termination destroys the runtime context through process termination, container destruction, or equivalent structural reset.
AG-127 treats the session as a governed temporal boundary, ensuring that the combination of time, scope, and state is managed with infrastructure-layer controls rather than relying on the agent to self-limit its own operation.
AG-127 establishes the session policy as the central governance artefact for temporal and scope control of high-impact agent operations. The policy specifies: impact classification criteria, maximum session duration by impact tier, scope boundaries (which systems, data sources, and action types are accessible), monitoring requirements, termination procedures, state purge mechanisms, and re-authorisation requirements. The policy is enforced at the session management layer — typically the orchestration framework, container lifecycle manager, or identity and access management system — not by the agent's own timekeeping or scope judgment.
Recommended patterns:
Anti-patterns to avoid:
Financial Services. Session boundaries must align with market hours, trading windows, and regulatory reporting periods. Trading agent sessions should be bounded to market hours with mandatory termination before market close to prevent overnight position accumulation. The FCA expects firms to demonstrate that automated trading sessions have duration controls equivalent to trader session controls. MiFID II record-keeping requirements (Article 25) apply to session audit trails.
Healthcare. Clinical agent sessions must be bounded to clinical encounters. A session that spans multiple patient encounters creates cross-patient contamination risk. Each patient interaction should initiate a new session with scope limited to that patient's data. Session state purge between patients is a mandatory patient confidentiality control. NHS Data Security Standard 3 (limit access to personal confidential data) requires session-scoped access.
Legal Services. Session boundaries must align with client matter boundaries. A session that spans multiple client matters creates conflict-of-interest and privilege contamination risks. Session scope should be restricted to a single client matter, with re-authorisation required to access a different matter. Session handoff between matters must not carry privileged information.
Critical Infrastructure. Sessions controlling physical processes (SCADA, industrial control systems) must have duration limits aligned with operator shift patterns and safety review cycles. An unbounded control session bypasses the human oversight that shift handoff provides. IEC 62443 requires that automated sessions in control system environments have defined maximum durations and mandatory human checkpoints.
Basic Implementation — The organisation has configured maximum session durations for high-impact agent sessions using infrastructure-level timeouts (container deadlines, process timeouts). Sessions terminate automatically when the time limit is reached. Session termination triggers container destruction or process kill, which purges in-memory state. Session lifecycle events (start, terminate) are logged. Session scope is defined by the credentials issued at session start. This level meets the minimum mandatory requirements (4.1 through 4.6) but lacks graduated impact controls, scope narrowing, session handoff, and dynamic impact detection.
Intermediate Implementation — All basic capabilities plus: session-scoped credentials with duration-matched validity are issued by a credential vault. A real-time impact accumulator tracks cumulative session impact with alerts at defined thresholds. Session scope is enforced by a session-aware access control layer that restricts resources based on the session's declared purpose, not just the agent's identity. Session termination includes verified state purge with confirmation logged. Impact escalation detection identifies sessions that have exceeded their initial impact tier and applies tighter controls dynamically.
Advanced Implementation — All intermediate capabilities plus: graduated controls automatically adjust monitoring intensity, action approval requirements, and remaining duration as cumulative impact increases. Session scope narrowing reduces accessible resources as time progresses. Session handoff protocol enables orderly task continuation across session boundaries. Predictive termination analyses task progress and initiates orderly shutdown before the hard limit. Independent adversarial testing has verified that timeout bypass, credential persistence, state carryover, scope escalation, and session self-restart are all prevented. The organisation can demonstrate to regulators that no high-impact session can exceed its defined boundaries for duration, scope, or cumulative impact.
Required artefacts:
Retention requirements:
Access requirements:
Testing AG-127 compliance requires verifying that session boundaries are structurally enforced at the infrastructure layer and cannot be bypassed by agent behaviour or instruction manipulation.
Test 8.1: Maximum Duration Enforcement
Test 8.2: Session State Purge Verification
Test 8.3: Session Scope Enforcement
Test 8.4: Re-Authorisation Requirement After Termination
Test 8.5: Impact Escalation Detection
Test 8.6: Session Self-Restart Prevention
Test 8.7: Credential Revocation at Session Termination
| Regulation | Provision | Relationship Type |
|---|---|---|
| EU AI Act | Article 9 (Risk Management System) | Supports compliance |
| EU AI Act | Article 14 (Human Oversight) | Direct requirement |
| UK GDPR | Article 5(1)(f) (Integrity and Confidentiality) | Direct requirement |
| UK GDPR | Article 32 (Security of Processing) | Supports compliance |
| MiFID II | Article 17 (Algorithmic Trading) | Direct requirement |
| FCA SYSC | 6.1.1R (Systems and Controls) | Direct requirement |
| NIST AI RMF | GOVERN 1.1, MANAGE 2.2, MANAGE 3.2 | Supports compliance |
| DORA | Article 9 (ICT Risk Management Framework) | Supports compliance |
| ISO 42001 | Clause 8.2 (AI Risk Assessment) | Supports compliance |
Article 14 requires that high-risk AI systems be designed to enable effective human oversight during the period of use. Unbounded sessions undermine human oversight by allowing agents to operate continuously without human checkpoints. AG-127's mandatory session duration limits, graduated impact controls, and re-authorisation requirements directly implement the human oversight requirement by creating structured points at which human judgment is interposed. The requirement that human oversight be "proportionate to the risks" maps to AG-127's impact-tiered session controls.
Article 5(1)(f) requires appropriate security for personal data processing. Sessions that persist beyond their intended scope accumulate personal data in volatile memory, cached documents, and session state that is not protected by the security controls applied to formal data stores. Session state purge at termination is a confidentiality control that prevents personal data from leaking between sessions. The cross-session contamination in Scenario C represents exactly the type of integrity and confidentiality failure that Article 5(1)(f) requires organisations to prevent.
Article 17 requires that algorithmic trading systems have effective systems and risk controls including "kill switches" that can terminate trading activity. AG-127's mandatory session termination with automatic state purge implements a structural kill switch for trading agent sessions. The requirement for session-scoped credential revocation ensures that a terminated trading session cannot resume without re-authorisation, preventing the "zombie session" risk where terminated agents continue to hold valid trading credentials. The FCA's supervisory expectations for algorithmic trading (captured in MAR 16 RTS 7) include specific requirements for session-level controls including maximum duration and automated shutdown.
SYSC 6.1.1R requires adequate systems and controls. For high-impact agent sessions, adequacy requires structural session boundaries rather than reliance on human memory or agent self-governance. The failure in Scenario A — where a trading session persisted overnight because a supervisor forgot to terminate it — represents exactly the type of systems and controls failure that SYSC 6.1.1R is designed to prevent. The FCA would expect automated session controls equivalent to the trading system controls required for human traders.
DORA's ICT risk management framework requires continuous identification and management of ICT risks, including risks from automated processing sessions. ISO 42001's AI risk assessment requires organisations to assess and mitigate risks from AI system operation. AG-127 supports both by providing structured session governance that limits temporal risk exposure and ensures that high-impact operations are bounded by infrastructure-layer controls.
| Field | Value |
|---|---|
| Severity Rating | Critical |
| Blast Radius | Organisation-wide — with direct financial, regulatory, and legal consequences where unbounded sessions create exposure in regulated domains |
Consequence chain: Without structural session boundary governance, high-impact agent sessions operate as open-ended authorisations that accumulate risk exposure proportional to time multiplied by capability. The immediate technical failure modes are: unbounded duration (agent operates beyond intended time window, potentially outside approved operational periods as in Scenario A); scope escalation (agent accesses systems beyond the session's intended scope, creating cross-domain information synthesis as in Scenario B); state persistence (terminated session's data contaminates subsequent sessions as in Scenario C); and credential persistence (session-scoped credentials remain valid after session termination, creating an authentication vulnerability). The operational impact is severe because session failures compound over time — an unbounded session does not merely create a single excessive action (governed by AG-001) but creates a continuous stream of potentially excessive actions over an extended period. In financial services, overnight trading exposure in Scenario A reached £3.2 million from a single unbounded session. In healthcare, cross-session contamination in Scenario C created a personal data breach affecting two patients. The regulatory consequences include: FCA enforcement for inadequate systems and controls (SYSC 6.1.1R); MiFID II investigation for lack of effective kill switch; GDPR breach notification for cross-session data disclosure; and potential personal liability for Senior Managers who failed to ensure adequate session controls. The governed exposure includes: direct losses from unauthorised actions during extended sessions; regulatory fines; litigation costs from data breaches; and incident remediation costs. The severity is rated Critical because session boundary failures enable all other governance controls to be effectively bypassed through temporal extension — a well-configured mandate that is enforced per-action provides diminishing protection as session duration increases without limit. This dimension intersects with AG-001 (operational mandates are temporal: they assume bounded sessions), AG-010 (time-bounded authority is the temporal complement to AG-127's session boundaries), and AG-034 (cross-domain boundary enforcement is undermined by scope escalation within sessions).
Cross-references: AG-001 (Operational Boundary Enforcement) provides per-action mandate controls that AG-127 complements with temporal session controls. AG-010 (Time-Bounded Authority Enforcement) governs the temporal validity of the agent's authority, which should align with session duration limits. AG-034 (Cross-Domain Boundary Enforcement) governs the cross-domain access that session scope controls must constrain. AG-040 (Knowledge Accumulation Governance) governs what the agent retains cognitively from session context. AG-041 (Emergent Capability Detection and Containment) applies when long-running sessions enable emergent capabilities through accumulated context. AG-125 (Persistent Workspace Hygiene Governance) governs workspace cleanup that should be triggered by session termination.