Skip to main content

ARIA’s Seven Controls — Plain-Language Overview

A no-code guide for PMs: what each control is, why it matters, and how it works


Big picture

ARIA wraps every agent action in seven, purpose-built safeguards. Each control solves a different failure mode (privacy, drift, tool changes, overspend, audit gaps). They’re lightweight, standards-aligned, and designed to work together without changing your tools or identity systems.


1) User-Bound Agent Identities

One agent instance = one person. Always.

  • What it is Every agent instance is tied to a single end user with a tamper-proof ID. If the agent is “for Alice,” it cannot see or act as Bob.

  • Why it matters Prevents cross-user data leakage and “who did this?” confusion. Keeps privacy and compliance simple.

  • How it works (plain) Think of a valet ticket that only works for your car. The agent presents a ticket that proves who it’s acting for; ARIA refuses the call if the ticket and user don’t match.

  • PM levers Decide the scope: per person, per tenant, or per project—so analytics & budgets roll up cleanly.

  • Signals to track Denials for binding violations (should trend to near-zero after rollout).


2) Tool Schema Attestation

Only call tools that match the version you approved.

  • What it is ARIA checks that the tool/API being called matches a known, signed description (version + schema hash).

  • Why it matters Vendors and internal teams ship changes. A silent parameter change can break flows or loosen constraints.

  • How it works (plain) Like boarding the right flight: ARIA checks both the flight number and gate. If the tool’s “ticket” (its schema) changed, the call is blocked until you accept the new version.

  • PM levers Define rollout windows (e.g., allow previous version for 4 hours). Choose who can approve new versions.

  • Signals to track “Attestation mismatch” denials by tool/version. Time-to-accept new versions.


3) Zero-Knowledge Capability Proofs

Show you can do this action without revealing all you can do.

  • What it is Agents prove they hold a specific permission (e.g., “refund.issue”) without listing their entire permission set.

  • Why it matters Least-privilege by default, smaller tokens, and less sensitive metadata floating around.

  • How it works (plain) Like showing one stamp from a full stamp book. The agent reveals just the stamp needed for this action, not the whole book.

  • PM levers Define the capability catalog and naming (consistent, human-readable). Map tools → capabilities.

  • Signals to track Proof failures (usually mis-mapped capability names), token size trends.


4) Plan Contracts (Spend Guard included)

Pre-approve the steps, inputs, and budgets—then enforce them.

  • What it is A short, signed checklist: which steps an agent may take, in what order/parallel, with parameter fingerprints and per-step/total budgets.

  • Why it matters Eliminates “off-script” behavior and surprise spend. You know the maximum exposure before anything runs.

  • How it works (plain) Like a pre-authorized purchase order. If a step, parameter, or cost doesn’t match the contract, ARIA denies the call before the tool sees it.

  • PM levers Provide plan templates (refund flow, booking flow, provisioning flow). Set defaults for per-step caps and total budget.

  • Signals to track Denials by reason (off-script, step cap exceeded, total budget exceeded), remaining budget, burn rate.


5) Context-Root Binding

Lock the agent’s decision to the exact inputs you trust.

  • What it is ARIA fingerprints the trusted context (request, system instructions, prior tool outputs) and ties each decision to that fingerprint.

  • Why it matters Prevents prompt-injection and “someone changed the instructions mid-flight” attacks. Makes investigations straightforward.

  • How it works (plain) Like sealing a document packet with a wax stamp. If anything inside changes, the stamp no longer matches and ARIA refuses to proceed.

  • PM levers Decide which context elements are “trusted” (e.g., system prompts, policy text, approved knowledge sources).

  • Signals to track Context mismatch denials; top sources of untrusted context.


6) Behavioral DNA (BDNA) Monitoring

Spot unusual agent behavior before it causes damage.

  • What it is ARIA builds a baseline of how each agent usually behaves (sequence, timing, tool mix) and scores drift from that baseline.

  • Why it matters Compromised or misconfigured agents act differently. Early drift is an early warning.

  • How it works (plain) Like fraud detection on a credit card: if patterns deviate (new tools, odd timing, unusual volumes), ARIA can deny or ask for re-authorization.

  • PM levers Start in “observe” mode, then enforce above a drift threshold. Decide escalation paths (alert vs. block vs. require fresh plan).

  • Signals to track Drift score distribution by agent/tool; enforcement rate; time-to-baseline for new agents.


7) Intent Receipts (Receipt Chains)

Every decision is documented and tamper-evident.

  • What it is Each allow/deny creates a signed receipt with what was attempted, under which plan and context, and why it was allowed or stopped—linked together in a chain.

  • Why it matters Instant, trustworthy audit; easier incident response; clean evidence for compliance and chargebacks.

  • How it works (plain) Like numbered, sealed pages in a ledger—remove or edit one and the page numbers break. The chain proves completeness.

  • PM levers Decide where receipts go (SIEM, data lake, finance system), and the retention policy.

  • Signals to track Receipt volume, denial reasons, reconciliation with finance/FinOps.


How the seven controls reinforce each other

  • Identity (1) guarantees who the agent is for.
  • Capabilities (2) guarantee what it’s allowed to do.
  • Plan (3) guarantees how and how much it can do.
  • Context (4) guarantees why the decision is valid (the inputs).
  • Attestation (5) guarantees which tool and which version you’re calling.
  • BDNA (6) watches how it behaves over time.
  • Receipts (7) prove what actually happened.

If any piece doesn’t match, ARIA fails closed before the tool call.


What to spec for v1 (PM checklist)

  • Clear capability names and mapping to tools.
  • Plan templates per top workflows, with default caps.
  • Rollout window for new tool versions (e.g., 4 hours).
  • BDNA initial “observe” thresholds and alerting.
  • Receipt destinations and required fields for audit/FinOps.
  • KPIs: deny rate by reason, budget overrun attempts prevented, time-to-approve new tool versions, drift incidents, audit time saved.

Who benefits and how

  • CIO/CISO: isolation, integrity, and provable control without slowing delivery.
  • CFO/FinOps: hard spend limits and defensible evidence.
  • Platform/AI teams: ship agents faster with reusable guardrails instead of bespoke checks per tool.
  • Compliance/Legal: instant, tamper-evident trail for any question.

Bottom line: These seven controls make agent operations predictable, private, and provable—so you can scale agents with confidence, not anxiety.