AGF

The Rings Model

A concentric architecture for governed agentic systems — four rings, one fabric, one substrate.

Most agentic systems in production today have no structural governance. The agent produces output, and either a human reviews it or nobody does. There's no verification layer, no policy evaluation, no audit trail, and no mechanism for the system to improve over time. ("most" reflects practitioner observation across consulting engagements 2024–2026; we have no industry survey to cite.)

The Rings Model is a vendor-neutral logical architecture that organizes governance into four concentric rings — Execution, Verification, Governance, and Learning — plus a cross-cutting fabric and an environment substrate.

The Rings Model — Governed Agentic Systems

The Four Rings

Ring 0 — Execution

The core agent performs its domain task. It generates text, writes code, makes a recommendation, extracts data, or executes an action. Ring 0 is where the work happens.

Without governance, Ring 0 is all there is. Most deployed agentic systems today are Ring-0-only.

Ring 1 — Verification

A separate process evaluates Ring 0's output against quality criteria. The fundamental principle: the agent that creates output must not be the sole agent that validates it.

Ring 1 can loop — sending output back to Ring 0 for revision until it converges on acceptable quality. Ring 1 can also challenge — a dedicated adversarial critique role whose mandate is to find flaws, not confirm quality.

What Ring 1 answers: Is this output correct? Is it complete? Does it meet quality standards?

Ring 2 — Governance

Policy evaluation and authorization. Ring 2 determines whether a verified output should be released, using explicit governance rules (Policy as Code), human-reviewable gates, and organizational policy.

Ring 2 enforces two classes of gates:

  • Adaptive gates relax as the system proves reliability through Trust Ladders.
  • Mandatory gates never relax. Irreversible actions, regulatory requirements, and legally mandated reviews always fire, regardless of trust level.

What Ring 2 answers: Should this output be released? Does it comply with policy? Who authorized it?

Ring 3 — Learning

The system improves over time. Ring 3 observes execution patterns, calibrates trust levels, tunes verification thresholds, and proposes configuration changes.

Critically: Ring 3 proposes. It does not autonomously enact. All Ring 3 proposals pass through Ring 2 governance and Evaluation & Assurance testing before deployment.

The box can get smarter inside. It cannot grow itself.

What Ring 3 answers: How can the system get better? What should change?

The Fabric

Cross-cutting infrastructure that makes the rings composable:

  • Structured Output Persistence — rings communicate through schema-conformant artifacts, not raw text
  • Event-Driven Observability — every ring emits structured events, creating the shared nervous system
  • Identity & Attribution — every action carries authenticated identity context through every ring
  • Provenance Chains — every output carries its full decision history
  • Error Handling & Recovery — checkpointing at ring boundaries, graceful degradation
  • Security Fabric — input sanitization, output scanning, containment, identity verification at every boundary

The Rings Are Logical, Not Physical

This is the key architectural insight. The concentric ring diagram depicts one deployment mode — wrapper mode. But the rings are a logical architecture. How they manifest physically depends on the system type.

Ring Deployment Modes — Wrapper, Middleware/Interrupt, and Graph-Embedded

Wrapper Mode

Rings literally wrap execution. Sequential: Ring 0 produces → Ring 1 verifies → Ring 2 governs → output releases.

Best for: Batch pipelines, document processing, regulatory assessments.

Middleware / Interrupt Mode

Ring logic fires at specific decision points — tool calls, data access, state mutations. The agent executes continuously; rings intercept at defined boundaries. MCP is the canonical implementation.

Best for: Coding agents (Claude Code, Cursor), ops automation, multi-step task agents.

Graph-Embedded Mode

Verification, governance, and security run concurrently with execution. Speculative execution with a release gate.

Best for: Conversational agents, voice assistants, real-time systems.

Hybrid Is Normal

Systems commonly combine modes. A coding agent operates in middleware mode overall, but within a single response, uses graph-embedded mode for parallel output verification.

The Signal Protocol

Rings communicate through a standard composability interface — seven signals:

  • PASS — output accepted, move forward
  • REVISE(quality) — Ring 1 says "not good enough, try again"
  • REVISE(context) — Ring 2 says "the world changed, re-execute"
  • HALT — something is fundamentally wrong, stop
  • GATE — pause for human authorization
  • DELEGATE — hand off to another agent with depth tracking
  • ERROR — something broke; retry, degrade, or halt

This standard contract makes governance rings attachable to any pipeline.

Starting Simple, Growing Governed

Organizations don't implement all four rings at once. AGF defines four Composition Patterns as the canonical growth progression — each pattern independently valuable, each a foundation for the next. Ring activation is a consequence of pattern selection:

Composition Patterns — Progressive Build-Up from Minimum Viable Control to Full Governed System
  1. Minimum Viable Control — Ring 0 + Fabric (minimal). Scope, identity, audit trail. The agent can't exceed its scope and actions are attributable.
  2. Validation Pipeline — adds Ring 1. Verified outputs. Quality assurance becomes structural, not manual.
  3. Governed Decision Flow — adds Ring 2. Policy evaluation, human-reviewable gates, transaction control.
  4. Full Governed Agentic System — adds Ring 3 (Learning) and the environment optimization loop. Self-improvement, memory, and the full primitive set.

Between Governed Decision Flow and Full Governed, a hardening posture applies Adversarial Robustness (#15), Evaluation & Assurance (#18), and Trust Ladders (#11) to production-harden a GDF deployment before Ring 3 learning is enabled. This is a modifier, not a fifth pattern. See Composition Patterns for full detail.

Each pattern is independently valuable. Minimum Viable Control alone is more governance than most organizations have today.

Where This Came From

The Rings Model is not a novel invention. It is a composition of established patterns:

  • Separation of duties → Ring 1 exists because the producer should not be the sole validator
  • Policy enforcement points (NIST SP 800-207) → Ring 2 is the PDP, Security Fabric is the PEP
  • Continuous improvement loops (Deming, SRE) → Ring 3 is the improvement engine
  • Defense in depth → multiple independent layers, each adding different assurance
  • Proportional controls → activation intensity matches stakes

The contribution is the composition: pulling them together into a vendor-neutral, composable, adaptable architecture for the agentic context.

We named it. We didn't invent it.

On this page