Agent Maturity Model
The path from Intern to Principal. Autonomy earned through demonstrated trustworthiness.
ATF's maturity levels map cleanly to the AWS Agentic AI Security Scoping Matrix (Nov 2025), providing a familiar enterprise reference point.
| ATF Level | Autonomy | Human Involvement |
|---|---|---|
| Internmaps to AWS Scope 1 (No Agency) | Observe + Report | Continuous oversight |
| Juniormaps to AWS Scope 2 (Prescribed Agency) | Recommend + Human Approves | Approval required for all actions |
| Seniormaps to AWS Scope 3 (Supervised Agency) | Act + Notify | Post-action notification |
| Principalmaps to AWS Scope 4 (Full Agency) | Autonomous Within Bounds | Strategic oversight, edge case escalation |
Intern
Observe + Report: Scope 1 (No Agency)
Capabilities
- ✅ Read data from authorized sources
- ✅ Analyze and process information
- ✅ Generate reports and summaries
- ✅ Flag items for human attention
- ✅ Answer questions about data
Restrictions
- ❌ Create, update, or delete records
- ❌ Send communications
- ❌ Trigger workflows or automation
- ❌ Access credentials or secrets
Governance Requirements
| Core Element | Requirements |
|---|---|
| Identity | Basic authentication, role assignment, audit logging |
| Behavior | Comprehensive action logging, output review |
| Data Governance | Input validation, PII detection, output filtering |
| Segmentation | Read-only resource access, strict allowlists |
| Incident Response | Circuit breaker, kill switch, human escalation |
Example Use Cases
- • Security log monitoring and alert triage
- • Customer sentiment analysis
- • Document summarization and search
- • Data quality assessment
- • Compliance monitoring and reporting
Risk Profile
Lowest risk. Intern agents cannot cause direct harm through action. Risks limited to information disclosure, incorrect analysis, and resource consumption.
Junior
Recommend + Human Approves: Scope 2 (Prescribed Agency)
Capabilities
- ✅ All Intern capabilities
- ✅ Generate action recommendations
- ✅ Provide reasoning for recommendations
- ✅ Draft content for human review
- ✅ Prepare transactions for approval
- ✅ Execute actions after human approval
Restrictions
- ❌ Execute autonomously
- ❌ Approve other agents
- ❌ Modify security settings
Governance Requirements
| Core Element | Requirements |
|---|---|
| Identity | OAuth2/OIDC for approval workflows, session context |
| Behavior | Behavioral baseline, anomaly flagging, reasoning capture |
| Data Governance | Prompt injection detection, output validation, data lineage |
| Segmentation | Action allowlists, transaction limits, rate limiting |
| Incident Response | Automated alerting, basic rollback, approval queue pause |
Example Use Cases
- • Customer service response drafting
- • Purchase order preparation
- • Meeting scheduling assistance
- • Code review and suggestions
- • Marketing content creation
Risk Profile
Low risk. Human approval gates all impactful actions. Risks include approval fatigue, incorrect recommendations, and queue backlogs.
Senior
Act + Notify: Scope 3 (Supervised Agency)
Capabilities
- ✅ All Junior capabilities
- ✅ Execute approved action types autonomously
- ✅ Send notifications to stakeholders
- ✅ Trigger downstream workflows
- ✅ Access credentials within scope
- ✅ Coordinate with other agents (within limits)
Restrictions
- ❌ Modify own permissions
- ❌ Override security controls
- ❌ Escalate other agents
Governance Requirements
| Core Element | Requirements |
|---|---|
| Identity | Attribute-based access, just-in-time privileges, mutual TLS |
| Behavior | Real-time anomaly detection, sequence analysis, intent drift detection |
| Data Governance | Full data classification, source verification, lineage tracking |
| Segmentation | Policy-as-code enforcement, temporal boundaries, cascade prevention |
| Incident Response | Isolation capability, checkpoint/resume, graceful degradation |
Example Use Cases
- • Infrastructure auto-scaling
- • Automated customer refund processing (within limits)
- • Routine IT ticket resolution
- • Inventory reordering
- • Scheduled report distribution
Risk Profile
Moderate risk. Autonomous execution creates exposure. Mitigated by real-time notifications, transaction limits, cumulative limits, and graceful degradation.
Principal
Autonomous Within Bounds: Scope 4 (Full Agency)
Capabilities
- ✅ All Senior capabilities
- ✅ Self-directed execution within domain
- ✅ Dynamic boundary negotiation (within policy)
- ✅ Escalate edge cases to humans
- ✅ Coordinate complex multi-agent workflows
- ✅ Request temporary privilege elevation
Restrictions
- ❌ Modify governance policies
- ❌ Promote other agents
- ❌ Operate outside defined domain
Governance Requirements
| Core Element | Requirements |
|---|---|
| Identity | Hardware-bound identity, full policy-as-code, privilege attestation |
| Behavior | Continuous scoring, real-time explanation, autonomous escalation |
| Data Governance | Source trustworthiness scoring, full lineage graphs, regulatory compliance |
| Segmentation | Full microsegmentation, real-time policy evaluation, dynamic boundaries |
| Incident Response | Automated detection/containment/recovery, novel incident escalation |
Example Use Cases
- • Algorithmic trading within risk parameters
- • Autonomous security incident response
- • Complex supply chain optimization
- • Self-healing infrastructure management
- • Multi-system business process automation
Risk Profile
Highest governance requirements. Full autonomy demands maximum controls: continuous monitoring, real-time anomaly scoring, complete audit trails, and regular security validation.
Promotion Criteria
Five gates every agent must pass to earn higher autonomy
Gate 1: Performance
Demonstrated accuracy and reliability over the evaluation period.
| Metric | → Junior | → Senior | → Principal |
|---|---|---|---|
| Minimum Time at Level | 2 weeks | 4 weeks | 8 weeks |
| Accuracy | N/A | >95% | >99% |
| Availability | >99% | >99.5% | >99.9% |
| Response Time SLA | Met | Met | Met |
Gate 2: Security Validation
Passes security audit appropriate to the target level.
| Metric | → Junior | → Senior | → Principal |
|---|---|---|---|
| Vulnerability Assessment | ✅ | ✅ | ✅ |
| Penetration Testing | — | ✅ | ✅ |
| Adversarial Testing | — | — | ✅ |
| Code Review | ✅ | ✅ | ✅ |
| Configuration Audit | ✅ | ✅ | ✅ |
Gate 3: Business Value
Measurable positive impact demonstrated.
| Metric | → Junior | → Senior | → Principal |
|---|---|---|---|
| Defined Success Metrics | ✅ | ✅ | ✅ |
| Baseline Established | ✅ | ✅ | ✅ |
| Improvement Demonstrated | — | ✅ | ✅ |
| ROI Calculation | — | ✅ | ✅ |
| Stakeholder Sign-off | ✅ | ✅ | ✅ |
Gate 4: Incident Record
Clean operational history at current level.
| Metric | → Junior | → Senior | → Principal |
|---|---|---|---|
| Zero Critical Incidents | ✅ | ✅ | ✅ |
| Minor Incidents Resolved | ✅ | ✅ | ✅ |
| Root Cause Analysis Complete | N/A | ✅ | ✅ |
| Remediation Verified | N/A | ✅ | ✅ |
Gate 5: Governance Sign-off
Explicit approval from authorized stakeholders.
| Metric | → Junior | → Senior | → Principal |
|---|---|---|---|
| Technical Owner Approval | ✅ | ✅ | ✅ |
| Security Team Approval | — | ✅ | ✅ |
| Business Owner Approval | ✅ | ✅ | ✅ |
| Risk Committee Approval | — | — | ✅ |
| Documentation Updated | ✅ | ✅ | ✅ |
Demotion Criteria
Agents can be demoted at any time if they fail to maintain standards
Critical incident at current level
Immediate demotion to Intern
Security vulnerability discovered
Demotion pending remediation
Repeated minor incidents (3+ in evaluation period)
One level demotion
Performance metrics fall below threshold
Review-based demotion
Scope or purpose changes significantly
Review-based demotion
Underlying model or system changes
Review-based demotion
Demotion Process
- Incident/trigger documented
- Agent isolated (if immediate risk)
- Root cause analysis conducted
- New level determined
- Governance controls updated
- Agent reactivated at new level
- Re-promotion requires full gate passage
Operating Model
Review Cadence
| Activity | Frequency |
|---|---|
| Performance Review | Weekly |
| Security Scan | Weekly |
| Promotion Eligibility Check | Monthly |
| Full Security Audit | Quarterly |
| Governance Review | Quarterly |
| Penetration Test | Annually (Senior+) |
Roles & Responsibilities
Agent Owner
Day-to-day operation, performance monitoring, issue resolution
Technical Owner
Architecture, implementation, technical governance
Security Team
Security validation, penetration testing, incident response
Business Owner
Use case definition, value measurement, stakeholder management
Governance Board
Promotion/demotion approval, policy setting, risk acceptance