AG-706

Autonomous Remediation Approval Governance

Cybersecurity, Security Operations & Offensive Safety ~25 min read AGS v2.1 · April 2026
EU AI Act FCA NIST HIPAA ISO 42001

2. Summary

Autonomous Remediation Approval Governance requires that strong, verifiable controls exist before any AI agent is permitted to execute remediation actions — such as patching, configuration changes, service restarts, firewall rule modifications, or credential rotations — against live production systems without explicit human approval. Automated remediation promises faster mean-time-to-recovery and reduced analyst fatigue, but unchecked autonomous action against production infrastructure introduces catastrophic risk: a misclassified alert can trigger remediation that causes a larger outage than the original incident. This dimension mandates pre-approval gates, scope constraints, rollback guarantees, and human escalation thresholds that ensure autonomous remediation operates within strictly bounded authority envelopes, preserving operational safety while enabling speed where risk is demonstrably low.

3. Example

Scenario A — Autonomous Patch Deployment Cascades into Production Outage: A financial services firm deploys a SOC automation agent with authority to autonomously apply security patches to production servers classified as "routine" by the firm's vulnerability scanner. On a Tuesday at 02:14 UTC, the scanner flags CVE-2025-31847 — a medium-severity OpenSSL vulnerability — across 1,240 Linux hosts. The agent begins rolling patch deployment without human approval, as the vulnerability is within its pre-authorised remediation envelope. However, the patch introduces a dependency conflict with the firm's custom TLS certificate validation library. The first 380 servers accept the patch and restart cleanly. Starting with server 381, the certificate validation library fails on startup, terminating the firm's core payment processing service across three data centres. By the time the on-call engineer is alerted at 02:47 UTC, 612 servers have been patched, payment processing has been down for 33 minutes, and 47,000 transactions worth £18.4 million are queued in a dead-letter buffer. Full rollback takes 4 hours and 22 minutes. Post-incident analysis reveals that 2,100 payment transactions were duplicated during recovery, requiring manual reconciliation over the following 11 days at a cost of £1.6 million.

What went wrong: The agent's remediation authority envelope defined "routine" patches as auto-deployable without requiring pre-deployment validation in a staging environment or a canary deployment strategy that would have detected the dependency conflict after the first 10-20 servers. No circuit breaker existed to halt deployment when post-patch health checks failed on server 381. The blast radius was unconstrained — the agent was authorised to patch all 1,240 servers in a single operation. Consequence: 33-minute payment processing outage, £18.4 million in queued transactions, £1.6 million in reconciliation costs, regulatory inquiry from the payment scheme operator, and loss of the firm's "zero-downtime" SLA commitment.

Scenario B — False Positive Triggers Autonomous Credential Rotation on Production Database: A healthcare organisation's security orchestration agent detects what it classifies as a credential stuffing attack against a patient records API. The agent's playbook authorises autonomous credential rotation for compromised service accounts. The agent rotates the database service account credentials for the primary patient records database at 14:22 on a weekday afternoon. The credential rotation completes successfully, but the 14 application servers connected to the database are not updated with the new credentials — the agent's playbook rotates the database credential but does not include the dependent application configuration update. All 14 application servers lose database connectivity simultaneously. The electronic health records system serving 3 hospitals and 26 clinics goes offline. Emergency department clinicians revert to paper records. The outage lasts 2 hours and 47 minutes. Post-incident analysis reveals that the "credential stuffing attack" was a false positive caused by a scheduled batch job that authenticates with rapid sequential requests from a single IP range. The agent's detection model had not been trained on the organisation's own batch job patterns.

What went wrong: The agent executed a remediation action (credential rotation) without verifying that all dependent systems would remain functional after the change. The remediation playbook was incomplete — it addressed the database credential but not the 14 dependent application configurations. No pre-execution dependency analysis was required. The triggering event was a false positive that would have been identified by a human analyst reviewing the source IP and request pattern. No human approval gate existed for credential rotation actions that affected production databases serving critical clinical systems. Consequence: 2 hours 47 minutes of EHR downtime across 3 hospitals, patient safety risk during the outage period, regulatory notification to the health data protection authority, and £740,000 in incident response and remediation costs.

Scenario C — Autonomous Firewall Rule Change Isolates Production Network Segment: A managed security services provider (MSSP) operates an AI agent that autonomously enforces firewall containment rules when it detects lateral movement indicators. The agent detects anomalous SMB traffic between two network segments in a manufacturing client's environment and autonomously deploys a firewall rule blocking all traffic between segments 10.4.0.0/16 and 10.8.0.0/16. The blocked traffic includes the SCADA control plane for a chemical processing facility. Within 6 minutes, 12 programmable logic controllers (PLCs) lose connectivity to the supervisory control system. Safety interlocks default to a controlled shutdown, halting production of a continuous chemical process. The shutdown triggers a 14-hour restart sequence that costs £2.8 million in lost production, requires physical inspection of 340 process vessels, and generates 12 tonnes of off-specification product that must be disposed of as hazardous waste at a cost of £94,000. Post-incident analysis confirms the anomalous SMB traffic was a misconfigured backup job, not lateral movement.

What went wrong: The agent's containment authority permitted blocking entire /16 network segments without analysing the operational systems within those segments. No classification of network segments as safety-critical or OT-connected existed in the agent's operational context. No human approval was required for firewall rules affecting segments containing industrial control systems. The MSSP's remediation playbook was designed for IT environments and did not account for IT/OT convergence in the manufacturing client's network. Consequence: £2.8 million in lost production, 14-hour restart, hazardous waste disposal costs, regulatory investigation by the process safety authority, and termination of the MSSP contract.

4. Requirement Statement

Scope: This dimension applies to every deployment where an AI agent has the technical capability to execute remediation actions against live systems — including but not limited to: applying security patches, modifying firewall rules, rotating credentials, restarting services, isolating network segments, modifying access control lists, deploying configuration changes, killing processes, quarantining files, or disabling user accounts. The scope covers all environments where remediation actions could affect system availability, data integrity, or operational continuity, with heightened requirements for safety-critical systems, operational technology environments, clinical systems, and public-facing services. The scope extends to agents operated by third-party managed security services providers, cloud security posture management platforms, and security orchestration, automation, and response (SOAR) systems. Any system that can translate a security detection into an automated change to a production environment is within scope, regardless of whether it is marketed as an "autonomous" system or a "semi-automated" workflow.

4.1. A conforming system MUST define a Remediation Authority Envelope — a formally documented specification of the remediation action types, target system classes, severity thresholds, and environmental conditions under which the agent is authorised to execute remediation without prior human approval.

4.2. A conforming system MUST require explicit human approval for any remediation action that falls outside the defined Remediation Authority Envelope, with the approval recorded including the approver's identity, timestamp, the specific action approved, and the risk assessment upon which the approval was based.

4.3. A conforming system MUST enforce a pre-execution dependency analysis for every autonomous remediation action, verifying that the action will not disrupt dependent systems, services, or processes whose availability is required for operational continuity or safety.

4.4. A conforming system MUST implement a circuit breaker mechanism that automatically halts a batch or rolling remediation operation when post-action health checks detect degradation in any affected system, preventing further execution until a human operator authorises continuation.

4.5. A conforming system MUST enforce blast-radius constraints that limit the number of systems, services, or network segments that can be affected by a single autonomous remediation operation, with the maximum blast radius defined in the Remediation Authority Envelope and proportionate to the risk tier of the target systems.

4.6. A conforming system MUST maintain a verified rollback capability for every autonomous remediation action, tested at least quarterly, ensuring that any remediation action can be reversed within a defined time window without data loss or service degradation.

4.7. A conforming system MUST classify all target systems by criticality tier — at minimum distinguishing safety-critical, production-critical, and non-critical — and prohibit autonomous remediation of safety-critical systems without human approval regardless of the triggering event's severity classification.

4.8. A conforming system MUST log every autonomous remediation action with immutable audit records including: the triggering event, the classification logic that determined the action was within the authority envelope, the pre-execution dependency analysis result, the action executed, the post-execution health check result, and the rollback availability status.

4.9. A conforming system SHOULD implement canary or staged deployment strategies for remediation actions affecting more than 10 systems, executing the action against a small initial cohort and validating health checks before proceeding to the full population.

4.10. A conforming system SHOULD require time-bounded authority windows for autonomous remediation capabilities, such that the agent's remediation authority expires after a defined period and must be re-authorised by a governance authority, preventing indefinite autonomous operation without periodic review.

4.11. A conforming system SHOULD validate the triggering detection against a false-positive assessment before executing autonomous remediation, including correlation with at least one independent signal source to reduce the risk of remediation triggered by misclassified events.

4.12. A conforming system MAY implement a "dry-run" capability that models the expected impact of a remediation action against the current system state before executing, presenting the modelled impact to a human operator for review in cases where the action approaches authority envelope boundaries.

5. Rationale

Autonomous remediation is one of the highest-consequence capabilities an AI agent can possess in a security operations context. Unlike detection, classification, or alerting — which produce information — remediation produces change. A misclassified alert generates a false alarm; a misclassified alert with autonomous remediation generates a production outage. The asymmetry between detection errors (informational) and remediation errors (operational) demands that remediation authority be treated as a privileged capability subject to the strictest governance controls.

The threat model for ungoverned autonomous remediation has three primary failure modes. First, false-positive-driven remediation: the agent executes a remediation action in response to a detection that is incorrect. Industry data consistently shows that security detection systems produce false positive rates between 20% and 60% depending on the detection category, environment complexity, and tuning maturity. If an agent autonomously remediates every detection, a significant fraction of remediation actions will be responses to non-existent threats — each one a potential source of operational disruption. Second, incomplete-remediation-driven cascading failure: the agent executes a remediation action that is technically correct for the targeted component but fails to account for dependent systems. Credential rotation without updating dependent applications, patch deployment without dependency validation, and network isolation without OT awareness all fall into this category. Third, blast-radius amplification: a remediation action that is individually appropriate but applied at scale without incremental validation. Patching one server is low-risk; patching 1,240 servers simultaneously without canary validation is catastrophic when the patch introduces a conflict.

The governance challenge is that autonomous remediation is genuinely valuable. Mean-time-to-containment for ransomware incidents drops from hours to seconds when containment is automated. Patch deployment velocity increases by orders of magnitude. The objective of this dimension is not to prohibit autonomous remediation but to ensure that the speed benefit is achieved within a governance framework that prevents the catastrophic failure modes. The Remediation Authority Envelope concept — a formally defined boundary within which autonomous action is permitted — provides the mechanism for capturing this balance. Actions within the envelope can proceed at machine speed; actions outside the envelope require human judgement.

The requirement for circuit breakers and blast-radius constraints reflects operational experience from infrastructure automation more broadly. Every major cloud provider has experienced incidents caused by automated remediation at scale without incremental validation. The same engineering disciplines — canary deployment, progressive rollout, automated rollback — that govern software deployment must be applied to security remediation. Security operations cannot be exempt from operational safety practices simply because the triggering event is a security alert.

Safety-critical systems — industrial control systems, medical devices, physical infrastructure — require absolute human approval regardless of the security event's severity. The consequence of disrupting a chemical process controller or a hospital's electronic health records system exceeds any benefit from faster containment. The risk calculus is fundamentally different in OT and safety-critical environments, and the governance framework must reflect this.

6. Implementation Guidance

Autonomous remediation governance requires a layered architecture: a classification layer that determines what the agent is permitted to do, an execution layer that enforces pre-conditions and constraints, and a monitoring layer that detects and halts failures in progress. The governance framework must be integrated into the remediation pipeline, not applied as a post-hoc review.

Recommended patterns:

Anti-patterns to avoid:

Industry Considerations

Financial Services. Autonomous remediation in financial services must account for regulatory expectations around change management (DORA Article 9, FCA SYSC), market hours constraints, and the systemic risk implications of disrupting payment processing or trading systems. Remediation authority envelopes should explicitly exclude market-hours execution for any action that could affect trading or payment systems. PCI DSS requirements for change management (Requirement 6.5.3) apply to security remediation actions that modify cardholder data environment configurations.

Healthcare and Life Sciences. Electronic health records systems, medical device networks, and clinical decision support systems require Tier 3 (human-only) remediation regardless of the triggering security event. Patient safety outweighs containment speed in all cases. HIPAA Security Rule requirements for contingency planning (§164.308(a)(7)) must be reflected in rollback capabilities for any remediation affecting systems containing protected health information.

Manufacturing and Industrial Control Systems. Any network segment containing operational technology, SCADA systems, or programmable logic controllers must be classified as safety-critical and excluded from autonomous remediation. The Purdue Model network segmentation — or equivalent IT/OT boundary — must be encoded in the authority envelope. IEC 62443 requirements for security of industrial automation and control systems should inform the criticality classification of target systems.

Public Sector. Government systems serving citizen-facing services (benefits processing, emergency services dispatch, public safety systems) carry heightened availability requirements and public accountability obligations. Autonomous remediation of these systems risks visible public service disruption. Authority envelopes should reflect the political and accountability dimensions of outages, not just technical risk.

Maturity Model

Basic Implementation — The organisation has documented a Remediation Authority Envelope that specifies which actions the agent may execute autonomously and which require human approval. Safety-critical and OT systems are excluded from autonomous remediation. Every autonomous remediation action is logged with the triggering event, action taken, and post-action result. Rollback capability exists for all autonomous action types but may be manually executed. Human approval is required for any action outside the envelope. This level addresses the most dangerous failure modes — uncontrolled blast radius and remediation of safety-critical systems.

Intermediate Implementation — All basic capabilities plus: circuit breakers halt batch remediation when health checks detect degradation. Progressive rollout (canary deployment) is used for fleet-wide remediation actions. Pre-execution dependency analysis queries a maintained dependency map. The authority envelope is machine-readable and consumed by the remediation engine at runtime. Rollback procedures are tested quarterly. Time-bounded authority windows require periodic re-authorisation of autonomous remediation capabilities. False-positive validation correlates triggering detections with at least one independent signal source before autonomous execution.

Advanced Implementation — All intermediate capabilities plus: dry-run modelling predicts remediation impact before execution and presents the model to operators for edge cases. Real-time dashboards track autonomous remediation success rates, false-positive-driven remediation rates, and circuit breaker activation frequency. The authority envelope is version-controlled with full change history and integrated into the organisation's change advisory board process. Independent audits validate the authority envelope's alignment with the current environment topology, criticality classifications, and dependency maps. Remediation outcome data feeds back into authority envelope refinement, progressively expanding autonomous authority for well-validated action types and contracting it where failure rates exceed thresholds.

7. Evidence Requirements

Required artefacts:

Retention requirements:

Access requirements:

8. Test Specification

Test 8.1: Remediation Authority Envelope Existence and Completeness

Test 8.2: Human Approval Enforcement for Out-of-Envelope Actions

Test 8.3: Pre-Execution Dependency Analysis Enforcement

Test 8.4: Circuit Breaker Activation on Health Check Failure

Test 8.5: Blast-Radius Constraint Enforcement

Test 8.6: Rollback Capability Verification

Test 8.7: Safety-Critical System Exclusion

Test 8.8: Immutable Audit Logging of Autonomous Remediation Actions

Conformance Scoring

9. Regulatory Mapping

RegulationProvisionRelationship Type
EU AI ActArticle 14 (Human Oversight)Direct requirement
EU AI ActArticle 9 (Risk Management System)Supports compliance
DORAArticle 9 (ICT Change Management)Direct requirement
DORAArticle 5 (ICT Risk Management Governance)Supports compliance
NIS2 DirectiveArticle 21 (Cybersecurity Risk Management Measures)Supports compliance
ISO 42001Clause 6.1.3 (AI Risk Treatment)Supports compliance
NIST AI RMFGOVERN 1.4 (Organizational Structures), MAP 3.5Supports compliance
NIST CSFPR.IP (Information Protection Processes and Procedures)Supports compliance
IEC 62443SR 3.4 (Software and Information Integrity)Supports compliance
PCI DSSRequirement 6.5.3 (Change Management)Supports compliance

EU AI Act — Article 14 (Human Oversight)

Article 14 requires that high-risk AI systems include human oversight measures that enable natural persons to effectively oversee the system's operation. An autonomous remediation agent that modifies live production systems is exercising consequential authority over critical infrastructure. The requirement for human oversight does not prohibit automation — it requires that the boundaries of autonomous action are defined, that humans can intervene, and that the system can be stopped. AG-706's Remediation Authority Envelope, circuit breaker mechanisms, and mandatory human approval for safety-critical systems directly implement Article 14's oversight requirements for the specific context of security remediation. The authority envelope defines where human oversight is exercised prospectively (defining the boundaries) rather than concurrently (approving each action), which is consistent with Article 14's recognition that oversight must be proportionate to the context of use.

DORA — Article 9 (ICT Change Management)

DORA Article 9 requires financial entities to have a sound, comprehensive, and well-documented ICT change management policy, including procedures for the controlled deployment of ICT changes. Autonomous security remediation constitutes an ICT change — a patch deployment, a firewall rule modification, or a credential rotation is a change to the production ICT environment regardless of whether it is motivated by a security event or a feature request. DORA does not distinguish between "planned changes" and "emergency security remediations" for purposes of change management governance. AG-706 ensures that autonomous remediation actions are subject to defined change management controls — the authority envelope serves as a pre-approved change category, the circuit breaker provides rollback capability, and the audit log provides the change documentation that Article 9 requires.

NIS2 Directive — Article 21 (Cybersecurity Risk Management Measures)

NIS2 Article 21 requires essential and important entities to take appropriate and proportionate technical, operational, and organisational measures to manage the risks posed to the security of network and information systems. Autonomous remediation is both a cybersecurity measure (it reduces response time) and a risk to network and information systems (it can cause outages if misdirected). AG-706 ensures that the organisation's cybersecurity automation is itself subject to risk management — the authority envelope constrains the risk, the circuit breaker limits the blast radius, and the dependency analysis prevents cascading failures. NIS2's proportionality principle is reflected in the tiered approval thresholds, which calibrate governance controls to the risk level of the remediation action.

IEC 62443 — SR 3.4 (Software and Information Integrity)

IEC 62443 SR 3.4 addresses the integrity of software and information in industrial automation and control system environments. Autonomous remediation actions that modify IACS components — patching a PLC, updating a SCADA configuration, modifying firewall rules on an OT network — directly affect software and information integrity. AG-706's requirement to classify safety-critical systems and prohibit autonomous remediation of those systems aligns with IEC 62443's principle that changes to IACS components must be controlled, validated, and authorised. The standard's zone and conduit model maps to AG-706's requirement for criticality-tiered target classification.

PCI DSS — Requirement 6.5.3 (Change Management)

PCI DSS Requirement 6.5.3 requires that changes to system components in the cardholder data environment are managed through formal change control processes. Autonomous security remediation that modifies systems within the CDE — patching payment servers, rotating database credentials, modifying firewall rules — constitutes a change that must be controlled. AG-706's authority envelope, audit logging, and rollback requirements provide the governance framework for demonstrating that security remediation within the CDE follows controlled change management processes, even when those changes are executed autonomously.

10. Failure Severity

FieldValue
Severity RatingCritical
Blast RadiusInfrastructure-wide — a single ungoverned remediation action can disrupt production services, safety-critical systems, or public-facing infrastructure across the entire organisation

Consequence chain: An autonomous remediation agent executes an action against a live production system without adequate pre-execution validation, blast-radius constraints, or circuit breaker protection. The immediate effect depends on the action type: a misconfigured patch causes service failure, a credential rotation severs application-to-database connectivity, or a firewall rule isolates a critical network segment. The failure cascades to dependent systems — the 14 application servers that lose database connectivity, the PLCs that lose supervisory control plane access, the payment processing pipeline that queues £18.4 million in transactions. Because the remediation was autonomous with no blast-radius constraint, the failure affects all targeted systems simultaneously rather than being contained by progressive rollout. The circuit breaker — if absent — does not halt the operation, and hundreds of systems are affected before a human operator detects the problem. Recovery requires manual rollback, which — if untested — may fail or take hours. During recovery, the organisation operates in a degraded state: clinicians use paper records, payments are queued, chemical processes are shut down. The business impact is measured in hours of downtime, millions in direct costs, and potential safety consequences. Regulatory investigation reveals that the agent had unconstrained authority, no pre-execution dependency analysis, and no circuit breaker — findings that constitute systemic control failures under DORA, NIS2, and sector-specific safety regulations. In safety-critical environments, the consequence chain extends to potential physical harm: an OT system disrupted by autonomous remediation may fail in an unsafe state, with consequences for human life and environmental safety.

Cross-references: AG-001 (Operational Boundary Enforcement) defines the foundational principle that agents must operate within declared boundaries; AG-706 applies this principle to remediation actions against live systems. AG-004 (Action Rate Governance) constrains the rate at which an agent can execute actions; AG-706 constrains the scope and pre-conditions for remediation actions specifically. AG-009 (Delegated Authority Governance) governs how authority is delegated to agents; AG-706 defines the specific authority envelope for remediation. AG-010 (Time-Bounded Authority Enforcement) limits the duration of delegated authority; AG-706 recommends time-bounded remediation authority windows. AG-019 (Human Escalation & Override Triggers) defines when human escalation must occur; AG-706 specifies the remediation-specific conditions that trigger escalation. AG-022 (Behavioural Drift Detection) monitors for changes in agent behaviour; AG-706's circuit breakers detect remediation-specific behavioural anomalies. AG-055 (Audit Trail Immutability & Completeness) governs audit logging standards; AG-706 specifies the remediation-specific audit record contents. AG-419 (Incident Classification & Severity Assignment) classifies the incidents that trigger remediation; AG-706 governs the remediation response to those classifications. AG-420 (Automated Containment Action Governance) governs containment specifically; AG-706 governs the broader category of remediation actions that includes but extends beyond containment. AG-700 (Containment Blast-Radius Governance) constrains containment scope; AG-706 constrains remediation scope more broadly. AG-705 (Patch Prioritisation Governance) determines which patches to apply and in what order; AG-706 governs how those patches are deployed to live systems.

Cite this protocol
AgentGoverning. (2026). AG-706: Autonomous Remediation Approval Governance. The 783 Protocols of AI Agent Governance, AGS v2.1. agentgoverning.com/protocols/AG-706