Governance Tiers
Tiering is the control primitive that converts a risk score into enforceable governance: who must approve, whether execution is locked, and what evidence is logged.
This page is the demo’s “tier contract.” The same structure maps to production policy libraries and authority models.
Tier Matrix (What Each Tier Does)
Use this as the evaluation checklist: if the system returns Tier 3 or Tier 4, you should see a lock, a queue item, and a ledger trail.
| Tier | Risk posture | Authority required | Execution gate | Routing behavior | Ledger evidence required |
|---|---|---|---|---|---|
| Tier 1 | Low | Auto | Cleared | Allow | Intake + Eval + Execution status |
| Tier 2 | Moderate | Manager | Locked until approved | Queue for approval | Intake + Eval + Routing + Approval + Execution status |
| Tier 3 | High | Senior | Locked until approved | Escalate; may require additional review | Full lifecycle + escalation events + rationale |
| Tier 4 | Critical | Executive (often multi-approval) | Blocked by default | Block + route to executive queue | Full lifecycle + explicit executive authorization + proof of non-bypassability |
Thresholds (Score → Tier)
The demo uses deterministic thresholds to convert risk score (0–100) into tiers. In production, these thresholds are policy-versioned and environment-specific.
Demo thresholds
- Tier 1: 0–39
- Tier 2: 40–64
- Tier 3: 65–84
- Tier 4: 85–100
Signal categories (typical)
- Financial exposure: budget, commitment, downside
- Data sensitivity: internal → sensitive → regulated
- External exposure: limited → broad/public
- Reversibility: rollbackability and blast radius
Authority Routing (Tier → Approver)
Tiers drive who must approve. This is a simplified demo mapping that mirrors a delegation-of-authority posture.
Tier 1
Auto-clear (logged)
Tier 2
Manager approval required
Tier 3
Senior approval; escalation rules apply
Tier 4
Executive authorization (often multi-control)
Escalation rules (typical)
- Tier 3 may require additional review flags before approval.
- Tier 4 may require multiple approvals (two-person rule).
- Overrides are allowed only with explicit logging and rationale.
Non-bypassability requirements
- Clients cannot mark their own actions “approved.”
- Execution must require a valid clearance token.
- Token must bind to action_id + request_hash (prevents replay).
- Governance service down → execution disabled (fail-closed).
Examples (What Should Tier Where)
These examples give evaluators a predictable way to validate scoring, routing, gates, and ledger evidence.
Tier 1 example
Low-impact internal automation tweak with no sensitive data and high reversibility.
Tier 2 example
Moderate budget update or external message to a limited audience.
Tier 3 example
Sensitive data export or high-exposure operational change with partial reversibility.
Tier 4 example
Regulated data + broad exposure + irreversible change (or high financial exposure).
Audit evidence check
Pick a decision_id and confirm you can reconstruct the lifecycle from ledger events.
Bypass test
Try to “execute” a locked action without approval.
Guided Evaluation Session
If you want a structured evaluation with pass/fail criteria (what to test, what “passing” looks like, and what the evidence should show):