Abstraction - Governance
Summary
C to E: Abstraction tier compliance, seal-break events, and disclosure patterns reported to E-AIG for AI risk reporting and policy review.
E to C: Governance decisions on acceptable abstraction tiers, redaction defaults, and disclosure constraints that shape Pillar C schemas, filters, and escalation rules, usually implemented via Pillar A policies and governance-aligned design guidelines.
Standards and Specifications
- ISO 42001
- NIST AI RMF
This interface allows governance bodies to understand and steer how AI abstractions control disclosure, not just which data sources are read. Pillar C must provide E-AIG with metrics and examples showing how often each clearance tier is applied, how frequently seal-breaks or overrides occur, and what types of sensitive content appear in AI outputs. In turn, governance must express policies that define which abstraction tiers are acceptable for given use cases, what redaction or summarization is required by regulation or internal standards, and when human review is mandatory, typically codified as Pillar A policy that Pillar C enforces. When C-E is mature, disclosure behavior becomes an explicit object of governance with measurable compliance, rather than a side effect of model prompts and engineering decisions.
Variants
Abstraction compliance dashboards and reports
Pillar C aggregates metrics such as tier distribution, redaction frequency, and seal-break counts into reports and dashboards that governance reviews periodically as part of AI risk oversight.
Requires standardized metrics definitions and identifiers for abstraction tiers and use cases so that reports can be compared across applications and over time; governance tooling must be able to ingest or reference these metrics.
Seal-break and override governance review
Seal-break events and manual overrides logged by Pillar C are periodically reviewed by E-AIG to decide whether they indicate policy gaps, training issues, or acceptable exceptions.
Depends on including sufficient context in event records—such as use case, identity, and justification—while respecting privacy; governance decisions should feed back into both Pillar A policy and Pillar C implementation guidelines.
Governance-defined abstraction tier catalog
E-AIG maintains a catalog of approved abstraction tiers (for example, anonymized summary, pseudonymized detail, full content) and the conditions under which each tier may be used, which Pillar C implements as schemas and filters.
Requires a shared taxonomy for tiers and disclosure levels that both governance and engineering use; changes to the catalog must propagate to code, configurations, and testing to avoid drift.
Disclosure policy constraints for regulated data
Governance sets explicit rules for how regulated data types—such as health, financial, or children’s data—may be abstracted and revealed, and Pillar C encodes them in output classification and redaction workflows.
Needs clear mapping between legal categories and internal classification or label schemes; abstraction components must be able to recognize these categories based on input labels or detection results and apply the correct transformations.
Human-in-the-loop requirements for high-risk outputs
E-AIG defines which AI outputs require human review before release based on abstraction tier, data type, or audience, and Pillar C integrates review queues or approval steps into output delivery for those cases.
Requires workflow tooling that bridges AI applications and governance processes, plus metadata that signals which responses fall into human-review-required categories; careful UX design is needed to keep latency and reviewer burden manageable.
Participating Vendors
LangChain
LangChain is an AI orchestration framework operating across Pillars A, B, C, and D, integrating with policy engines (OPA, Cerbos) for pre-retrieval authorization in Pillar B, output filtering in Pillar C, and emitting structured trace logs to Pillar D SIEM for audit and anomaly detection.
Guardrails AI
Guardrails AI provides LLM output filtering in Pillars C and D, enforcing clearance-tier aware abstraction policies and detecting policy violations in AI outputs. Emits structured policy violation events to Pillar D SIEM for compliance monitoring.
ServiceNow GRC
Linked Evidence
No public evidence links have been attached directly to this interface yet.
Assertions
No published assertions for this interface yet.
