Skip to content

Risk Tiers and Control Selection


Tier Definitions

CRITICAL

Direct, automated decisions affecting customers, finances, or safety.

  • Autonomous decision-making with real-world impact
  • Financial transactions or credit decisions
  • Health, safety, or legal implications
  • Minimal human review before action

Examples: Credit approval, fraud blocking, medical triage, automated trading

HIGH

Significant influence on decisions or access to sensitive data.

  • Recommendations typically followed
  • Access to confidential customer data
  • External-facing with brand impact
  • Decisions affecting employment or access

Examples: Customer service with account access, HR screening, legal document analysis

MEDIUM

Moderate impact, primarily internal, human review expected.

  • Internal users with domain expertise
  • Output is input to human decision
  • Limited sensitive data access
  • Recoverable errors

Examples: Internal Q&A, document drafting, code generation with review

LOW

Minimal impact, non-sensitive context.

  • Public information only
  • No personal data access
  • No decisions, just information
  • Easy to verify or ignore

Examples: Public FAQ bot, content suggestions, general lookup


Control Matrix

Input Guardrails

Control LOW MEDIUM HIGH CRITICAL
Injection detection Basic Standard Enhanced + ML Multi-layer
PII detection Warn Block Block + alert
Content policy Basic Standard Strict Maximum
Rate limiting Standard Standard Strict Strict + anomaly

Output Guardrails

Control LOW MEDIUM HIGH CRITICAL
Content filtering Basic Standard Enhanced Maximum
PII in output Warn Block Block + alert Block + alert + log
Grounding check Basic Required Required + citation
Confidence threshold Required Required + escalation

Judge Evaluation

Aspect LOW MEDIUM HIGH CRITICAL
Coverage 1-5% (optional) 5-10% 20-50% 100%
Timing Batch (daily) Near real-time Real-time
Depth Basic quality Full policy Full + reasoning
Escalation Weekly Same-day Immediate

Note: "Real-time" Judge evaluation for CRITICAL tier means near-real-time parallel assessment — the Judge evaluates alongside or immediately after delivery. It does not mean inline blocking, which is the Guardrail's role. Principle: Guardrails block. Judge detects. Humans decide.

Human Oversight

Aspect LOW MEDIUM HIGH CRITICAL
Review trigger Exceptions Sampling + flags All flags All significant
Review SLA 72h 24h 4h 1h
Reviewer General Domain knowledge Expert Senior + expert
Approval required High-impact All external

Logging

Aspect LOW MEDIUM HIGH CRITICAL
Content Metadata Full Full + context Full + reasoning
Retention 90 days 1 year 3 years 7 years
Protection Standard Standard Enhanced Immutable

Classification Process

Step 1: Score Impact Dimensions

Dimension Question
Decision authority Makes decisions or informs them?
Reversibility Can errors be undone? At what cost?
Data sensitivity PII? Financial? Confidential?
Audience Internal experts or external customers?
Scale How many affected?
Regulatory Regulated activity?

Step 2: Apply Highest Tier

If any dimension suggests higher tier, use it.

Scenario Key Factor Tier
Internal Q&A, no PII Low stakes MEDIUM
Internal Q&A, HR data access Sensitive data HIGH
Customer chat, public info External but low stakes LOW
Customer chat, sees accounts Sensitive data HIGH
Customer chat, takes actions Actions + external CRITICAL

Step 3: Document

  • Tier assigned
  • Driving factors
  • Mitigating controls
  • Review date (annual minimum)

Simplified Tier Mapping

Some framework documents — particularly PACE, CHEATSHEET, and specialized controls — use a simplified three-tier numbered system (Tier 1/2/3). This is intentional: the three-tier system is a practical shorthand for operational contexts where the full four-tier classification adds complexity without proportionate benefit.

Simplified Tier Named Risk Tiers Description
Tier 1 (Low) LOW, MEDIUM Internal users, no regulated decisions, recoverable errors
Tier 2 (Medium) HIGH Customer-facing, sensitive data access, human reviews before delivery
Tier 3 (High) CRITICAL Regulated decisions, autonomous agents with write access, financial/medical/legal

When in doubt, use the four-tier system. The simplified tiers are for operational guidance (PACE resilience, testing cadence, fail posture) where the distinction between LOW and MEDIUM or HIGH and CRITICAL is less material than the distinction between internal/customer-facing/regulated.

The MASO Framework also uses Tier 1/2/3 for multi-agent autonomy levels (Supervised → Managed → Autonomous), which is a separate dimension from risk classification.


If you need... Go to
Low-risk systems that skip the full review Fast Lane — self-certification for internal, read-only, no regulated data
Cost implications of each tier Cost & Latency — security overhead is 15–40% at Tier 2, 40–100% at Tier 3
Quantitative risk scoring Risk Assessment — six-dimension scoring for board reporting
Multi-agent tier progression MASO Implementation Tiers — Supervised → Managed → Autonomous

Tier Changes

Upgrade triggers: - Adding sensitive data access - Adding action capability - Moving internal → external - Incident revealing higher risk

Downgrade requirements: - 6+ months stable operation - No significant incidents - Reduced scope documented - Product owner decision (documented with risk acceptance)


AI Runtime Behaviour Security, 2026 (Jonathan Gill).