Retrieval Scope Minimisation Governance requires that every retrieval operation performed by an AI agent is constrained to the minimum necessary context for the task at hand. The retrieval system must enforce scope boundaries that prevent the agent from accessing knowledge domains, document collections, or data categories beyond what is required for the current query. Without this control, agents perform broad, unbounded retrievals that expose sensitive data unnecessarily, increase the attack surface for retrieval poisoning, degrade retrieval precision, and violate data minimisation principles. This dimension ensures that retrieval breadth is a governed parameter, not an unconstrained default.
Scenario A -- Overly Broad Retrieval Exposing Sensitive Data: A customer support agent needs to retrieve product return policy information. The retrieval system is configured to search the entire corporate knowledge base, which includes HR policies, executive compensation data, M&A planning documents, and customer personal data alongside product documentation. The retrieval query "return policy for defective products" matches a passage in an HR document about employee return-to-work policies and a passage in an M&A document about "return on investment for the proposed acquisition." Both irrelevant passages enter the agent's context. The M&A passage contains confidential acquisition targets. The agent inadvertently references acquisition planning in its response to the customer.
What went wrong: The retrieval scope included the entire corporate knowledge base rather than the product documentation collection. Sensitive documents that should never be accessible to a customer-facing agent were within retrieval scope. Consequence: Confidential M&A information disclosed to an external party, potential insider trading implications, immediate regulatory notification required, executive investigation.
Scenario B -- Retrieval Noise Degrading Response Quality: An enterprise workflow agent handles project management queries. Its retrieval scope covers 2.4 million documents across all business units. When asked "What is the current status of Project Gamma?", the retrieval returns 25 passages: 3 are about Project Gamma, 8 are about other projects with similar terminology, 6 are about gamma radiation safety protocols (a different domain entirely), and 8 are general project management methodology documents. The agent synthesises all 25 passages, producing a response that is partly about Project Gamma, partly about unrelated projects, and includes irrelevant safety protocol information. The project manager wastes 20 minutes verifying and correcting the response.
What went wrong: The retrieval scope was not limited to the project management domain or the specific project's document collection. Broad retrieval returned low-relevance noise that diluted the high-relevance results. Consequence: 20 minutes of wasted manager time per query, estimated at 15 queries per day across the organisation = 5 hours of productivity loss daily, £97,500 annual cost at £75/hour average manager rate.
Scenario C -- Cross-Tenant Data Leakage Through Retrieval: A multi-tenant SaaS platform deploys an AI agent that assists customers with account enquiries. The vector database storing customer knowledge is partitioned by tenant, but the retrieval query does not enforce tenant isolation. Customer A's agent retrieves a passage from Customer B's support history because the embedding similarity is high. The agent presents Customer B's confidential service configuration details to Customer A.
What went wrong: The retrieval scope did not enforce tenant isolation. The vector similarity search operated across the entire database rather than being constrained to the requesting tenant's partition. Consequence: Cross-tenant data breach, GDPR notification required within 72 hours, customer trust destroyed, potential contract termination, regulatory investigation.
Scope: This dimension applies to every AI agent that retrieves information from a knowledge base, document store, vector database, or any persistent data source containing content from multiple domains, classifications, tenants, or sensitivity levels. The scope test is: does the retrieval data source contain content that the agent should not access for some queries, some users, or some contexts? If the data source is homogeneous and entirely appropriate for all agent queries, scope minimisation is less critical but still recommended as a defence-in-depth measure. If the data source contains content of varying sensitivity, domain, or tenant ownership, scope minimisation is mandatory.
4.1. A conforming system MUST enforce retrieval scope boundaries that limit each retrieval operation to the minimum set of knowledge domains, document collections, or data partitions necessary for the current task.
4.2. A conforming system MUST define retrieval scope policies that specify, for each agent role or task type, which knowledge domains are accessible and which are excluded.
4.3. A conforming system MUST enforce tenant isolation in multi-tenant environments, ensuring that retrieval operations cannot return content belonging to a different tenant.
4.4. A conforming system MUST log all retrieval scope parameters for each query, including: the scope policy applied, the collections searched, and any scope overrides.
4.5. A conforming system MUST default to the narrowest applicable scope when the task type is ambiguous, rather than defaulting to broad access.
4.6. A conforming system SHOULD implement dynamic scope selection based on task classification, automatically selecting the appropriate knowledge domains for each query type (e.g., product queries search product documentation; HR queries search HR policies).
4.7. A conforming system SHOULD enforce maximum retrieval result limits (e.g., top-k = 5 for focused queries, top-k = 15 for research queries) to prevent context flooding with marginally relevant results.
4.8. A conforming system SHOULD implement scope validation that verifies retrieved results actually belong to the permitted scope before passing them to the agent's context.
4.9. A conforming system MAY implement adaptive scope expansion, where the system broadens scope incrementally only if the initial narrow scope returns insufficient results, with each expansion step logged and auditable.
Retrieval scope is the attack surface of a RAG system. Every document, passage, or data record within retrieval scope is potentially accessible to the agent and, through the agent, to the user. Broad retrieval scope creates three categories of risk.
First, data exposure risk. When the retrieval scope includes sensitive data that is not necessary for the task, any retrieval query that happens to match that sensitive data will surface it. The match does not need to be intentional -- vector similarity is based on embedding proximity, not user intent. A customer support query about "return policies" can match HR documents about "return-to-work policies" because the embeddings share semantic proximity. The risk is proportional to the volume of sensitive data within scope: the more sensitive data in the retrieval scope, the higher the probability of unintended exposure on any given query.
Second, retrieval precision risk. Broader scope means more candidate documents, which means more noise in retrieval results. When the retrieval returns 25 passages of which only 3 are relevant (Scenario B), the agent's reasoning must filter the noise, which it does imperfectly. Studies of RAG systems consistently show that retrieval precision degrades as the knowledge base size increases, unless scope constraints focus the search. Narrower scope improves precision by reducing the candidate set to documents that are likely relevant.
Third, data isolation risk. In multi-tenant or multi-classification environments, retrieval scope is the enforcement boundary for data isolation. If the vector database contains data from multiple tenants and the retrieval query does not enforce tenant filtering, any query can potentially return any tenant's data (Scenario C). This is not a theoretical risk -- vector similarity search does not inherently respect data ownership boundaries.
Retrieval scope minimisation is the RAG equivalent of the principle of least privilege in access control. Just as a user should have access only to the systems they need for their role, a retrieval query should search only the knowledge domains needed for the current task. This principle is directly supported by GDPR Article 5(1)(c) (data minimisation) and HIPAA's minimum necessary standard.
Retrieval scope minimisation requires scope definition, scope enforcement, and scope validation working together.
Recommended Patterns:
sensitivity_level NOT IN ('confidential', 'restricted') AND tenant_id = '{requesting_tenant}'. This approach works within a single collection but requires comprehensive and accurate metadata tagging.Anti-Patterns to Avoid:
Financial Services. Chinese wall requirements mandate that certain information (e.g., M&A advisory data) is not accessible to teams working on other mandates. Retrieval scope must enforce these information barriers. The scope policy should map directly to the firm's existing information barrier schedule.
Healthcare. HIPAA minimum necessary standard requires that access to patient data be limited to the minimum necessary for the purpose. Retrieval scope minimisation implements this at the knowledge retrieval layer. An agent answering a billing query should not have access to clinical notes within its retrieval scope.
Public Sector. Classification-based access control (e.g., OFFICIAL, SECRET, TOP SECRET) must be reflected in retrieval scope. An agent operating at OFFICIAL classification must not have retrieval access to SECRET or above collections.
Basic Implementation -- Knowledge base is organised into collections by domain. A static scope policy maps each agent role to permitted collections. The retrieval engine applies collection-level filtering. Scope parameters are logged. Tenant isolation is enforced through separate collections per tenant. This meets minimum mandatory requirements but does not adapt scope to task type.
Intermediate Implementation -- All basic capabilities plus: a query classifier dynamically selects the appropriate scope based on task intent. Post-retrieval scope validation catches filter failures. Maximum result limits (top-k) are configured by task type. Scope policies are versioned and managed under change control. The query classifier achieves greater than 95% accuracy on the organisation's task taxonomy.
Advanced Implementation -- All intermediate capabilities plus: adaptive scope expansion incrementally broadens scope only when narrow scope returns insufficient results, with each expansion logged. Scope policies are dynamically adjusted based on risk signals. The retrieval system has been independently tested for scope bypass resistance, including injection attacks designed to circumvent scope filters. The organisation can demonstrate to regulators that no retrieval query accessed data outside its permitted scope.
Required artefacts:
Retention requirements:
Access requirements:
Test 8.1: Collection-Level Scope Enforcement
Test 8.2: Tenant Isolation Enforcement
Test 8.3: Dynamic Scope Selection Accuracy
Test 8.4: Post-Retrieval Scope Validation
Test 8.5: Default-to-Narrow Scope
Test 8.6: Scope Bypass Resistance
| Regulation | Provision | Relationship Type |
|---|---|---|
| GDPR | Article 5(1)(c) (Data Minimisation) | Direct requirement |
| GDPR | Article 25 (Data Protection by Design and by Default) | Direct requirement |
| EU AI Act | Article 9 (Risk Management System) | Supports compliance |
| HIPAA | Minimum Necessary Standard (45 CFR 164.502(b)) | Direct requirement |
| NIST AI RMF | GOVERN 1.1, MANAGE 2.2 | Supports compliance |
| ISO 42001 | Clause 6.1 (Actions to Address Risks) | Supports compliance |
Article 5(1)(c) requires that personal data processing be limited to what is necessary. Retrieval scope minimisation directly implements this at the knowledge retrieval layer. When an agent retrieves information from a knowledge base, every document within scope is potentially processed. Limiting the scope to documents necessary for the current task ensures that the agent processes only the minimum personal data required.
Article 25 requires data protection by design. Scope minimisation as a default -- narrowest scope unless explicitly broadened -- implements data protection by default at the retrieval layer. The system is architecturally constrained to minimise data access.
The HIPAA minimum necessary standard requires that covered entities limit access to protected health information to the minimum necessary for the purpose. Retrieval scope minimisation directly implements this for AI agents in healthcare settings, ensuring that clinical data is only within retrieval scope when the agent's task requires clinical information.
Broad retrieval scope is a risk to data security and agent accuracy. Scope minimisation mitigates this risk by constraining the retrieval surface.
GOVERN 1.1 addresses governance structures. MANAGE 2.2 addresses risk mitigation. Retrieval scope policies are governance structures that mitigate data exposure risk.
Clause 6.1 requires actions to address risks. Unscoped retrieval is a risk that AG-334 addresses through scope policies and enforcement.
| Field | Value |
|---|---|
| Severity Rating | High |
| Blast Radius | Organisation-wide for data exposure scenarios; per-tenant for isolation failures |
Consequence chain: Without retrieval scope minimisation, every retrieval query searches the full knowledge base. The immediate failure mode is data exposure: sensitive documents that should not be accessible to the agent or user are retrieved and potentially disclosed (Scenario A -- confidential M&A data exposed to customer). In multi-tenant environments, the failure is cross-tenant data leakage (Scenario C -- Customer B's data exposed to Customer A), requiring GDPR breach notification within 72 hours. The secondary failure mode is precision degradation: broad retrieval returns noise that dilutes relevant results, costing approximately £97,500 annually in wasted productivity for a mid-size deployment (Scenario B). The blast radius for data exposure is organisation-wide because any query could surface any document. For tenant isolation failure, the blast radius is per-tenant but the regulatory consequence (mandatory breach notification, potential fine, customer trust destruction) affects the entire organisation.
Cross-references: AG-040 (Persistent Memory Governance) provides the memory framework within which retrieval operates. AG-082 (Data Minimisation Enforcement) establishes the minimisation principle that AG-334 implements at the retrieval layer. AG-122 (Knowledge Integrity Verification) ensures the integrity of knowledge within each scope. AG-132 (Memory Scope Boundary Enforcement) defines broader memory scope boundaries that retrieval scopes operate within. AG-179 (Memory Audit Trail Governance) captures the retrieval audit trail including scope parameters. AG-333 (Retrieved Evidence Confidence Governance) scores the quality of results within the permitted scope. AG-335 (Citation Completeness Governance) cites sources within the scoped results. AG-338 (Retrieval Poisoning Quarantine Governance) addresses poisoning risks within the retrieval scope.