Skip to content

Zones and Tiers

Complete guide to the three-zone governance model for AI agent classification.

Terminology: Zones vs Tiers

In this framework, Zone refers to the agent governance classification (Zone 1/2/3 = risk level). Tier is a separate concept used for environment classification (Development/Test/Production). These are distinct dimensions — a Zone 3 agent may exist across multiple environment tiers during its lifecycle.


Three-Zone Governance Model

The framework uses three governance zones to balance innovation with compliance. Agents progress from development (Zone 1) through team collaboration (Zone 2) to enterprise production (Zone 3).

Quick Comparison

Attribute Zone 1: Personal Zone 2: Team Zone 3: Enterprise
Risk Level Low Medium High
Scope Individual Department Organization-wide
Data Access M365 Graph only Internal data Regulated/sensitive
Approval Self-service Manager Governance Committee
Audit Retention 30 days 1 year 10 years
Managed Environment Not required Recommended Mandatory
MFA Standard Enforced Phishing-resistant
Regulatory Scrutiny None Moderate Full compliance
Setup Time 1-2 days 1-2 weeks 3-6 weeks

Executive Summary Matrix

This matrix provides a board-level summary for executive reporting and oversight discussions.

Dimension Zone 1: Personal Zone 2: Team Zone 3: Enterprise
Purpose Learning, prototyping, personal productivity Team collaboration, internal workflow automation Production deployment, customer-facing services
Risk Level Low Medium High
Data Sensitivity Personal data only, M365 Graph Internal business data Regulated data (PII, financial, customer)
AI Capabilities Experimental AI allowed Production-ready models only Validated models only
ALM Requirements None (direct editing) Basic version control recommended Full CI/CD pipeline with gates
Testing Required Informal Functional + security testing Comprehensive (functional, security, bias, performance)
Approval Authority Self-service Manager/Department Head Governance Committee + Legal
Regulatory Exposure None Moderate (FINRA 3110 supervision) Full (SEC 17a-3/4, FINRA 4511, OCC 2011-12)
Audit Retention 30 days 1 year 10 years (immutable)
Incident Response SLA Best effort 24 hours 4 hours
Human Oversight Optional Recommended Mandatory

Key Decision Factors for Executives:

Question Zone 1 Answer Zone 2 Answer Zone 3 Answer
Can this agent make decisions affecting customers? No No Yes, with oversight
Can this agent access customer data? No No Yes, with controls
Would a failure create regulatory exposure? No Limited Significant
Would a failure create reputational risk? No Limited Significant
Is external audit evidence required? No Limited Yes

Zone 1: Personal Productivity

Profile

  • Risk Level: Low
  • Scope: Individual developers
  • Typical Users: Single user or small team
  • Data Access: Microsoft Graph only
  • Regulatory Scrutiny: Minimal

Characteristics

  • Development and learning environment
  • Isolated from organizational controls
  • Quick prototyping and experimentation
  • No production customer data
  • Self-service deployment

Governance Model

  • Approval: Self-service (no approval needed)
  • Publishing: Self-published by creator
  • Data: Personal data only
  • Retention: 30 days (default)
  • Audit: Basic logging only
  • Access Reviews: Annual (if any)

Typical Agents

  • Personal productivity bot
  • Learning/development agent
  • Proof-of-concept demonstration
  • Personal research assistant

Technology Stack

  • Managed Environments: Not required
  • DLP: Baseline only
  • Audit: 30-day retention acceptable
  • Connectors: Restricted connectors allowed
  • MFA: Basic (standard M365 login)

Regulatory Status

Zone 1 is intended for personal productivity with no production customer data. Regulatory obligations may still apply depending on firm status, use case, and records created. Confirm applicability with compliance/legal before assuming no regulatory scope applies.

  • Books and records requirements: Not typically applicable if no customer/business records created
  • Formal supervision: Not typically required for personal productivity
  • Model risk management: Not typically required
  • Environment: Sandbox for innovation, but spillover into customer or trading data would move agents to Zone 2 or 3

Compliance Requirements

  • Document agent purpose
  • Maintain creator documentation
  • Basic audit logging
  • No external data sharing

Zone 2: Team Collaboration

Profile

  • Risk Level: Medium
  • Scope: Teams or departments
  • Typical Users: Team members within department
  • Data Access: Internal departmental data
  • Regulatory Scrutiny: Moderate

Characteristics

  • Shared across team/department
  • Internal data access
  • Collaboration and workflow support
  • Medium business impact if fails
  • Cross-team dependencies possible

Governance Model

  • Approval: Manager/Department Head approval required
  • Publishing: Central publishing workflow
  • Data: Departmental data only
  • Retention: 1 year minimum
  • Audit: Weekly exports recommended
  • Access Reviews: Quarterly

Typical Agents

  • HR benefits assistant
  • IT help desk support
  • Document processing for team
  • Compliance training delivery
  • Internal knowledge bot

Technology Stack

  • Managed Environments: Recommended
  • DLP: Strict policies
  • Audit: 1-year retention
  • Connectors: Approved connectors only
  • MFA: Enforced
  • Environment Groups: Recommended

Regulatory Status

Zone 2 is subject to MODERATE regulatory oversight:

  • FINRA examiners may request agent list and approval documentation
  • SEC reviewers may inquire about data handling
  • Supervisory controls per FINRA Rule 3110 required
  • Annual testing recommended

Compliance Requirements

  • Formal approval workflow
  • Documented business justification
  • Data source documentation
  • Access controls and permissions
  • Monthly compliance reviews
  • Training for users

Implementation Considerations

  • Department head signs off on deployment
  • Compliance reviews recorded
  • Access permissions documented
  • Data sources approved
  • Incident response procedures

Zone 3: Enterprise Managed

Profile

  • Risk Level: High
  • Scope: Organization-wide or customer-facing
  • Typical Users: Multiple departments, external customers
  • Data Access: Sensitive, regulated data
  • Regulatory Scrutiny: High / Critical

Characteristics

  • Production environment
  • Customer-facing or high-value business
  • Sensitive or regulated data
  • Critical business impact if fails
  • Full compliance requirements

Governance Model

  • Approval: Governance Committee + Legal review
  • Publishing: Change control process
  • Data: All regulated and sensitive data
  • Retention: 10 years minimum (conservative buffer exceeding SEC 17a-3/4: 6 years, first 2 years readily accessible)
  • Audit: Real-time monitoring
  • Access Reviews: Monthly with attestation

Typical Agents

  • Client service chatbot
  • Compliance monitoring
  • Trading/transaction processing
  • Document processing for regulated data
  • Risk assessment/credit scoring
  • Financial reporting assistant

Technology Stack

  • Managed Environments: Mandatory
  • DLP: Strictest policies
  • Audit: 10-year retention with WORM
  • Connectors: Allowlisted only
  • MFA: Phishing-resistant (FIDO2/Windows Hello)
  • Runtime Protection: Mandatory
  • DSPM for AI: Recommended

Retention Rationale

Zone 3's 10-year retention exceeds maximum regulatory requirements (SEC 17a-3/4: 6+3 years, SOX: 7 years) as a conservative buffer. Organizations may use 7-year minimum with documented risk assessment.

Regulatory Considerations

Zone 3 agents handling regulated data may be subject to comprehensive oversight depending on institution type and use case:

Institution Type Primary Regulator(s) Key Requirements
National banks OCC Model risk (OCC 2011-12), third-party guidance
State member banks Federal Reserve SR 11-7 model risk, supervision
State non-member banks FDIC Interagency guidance, FFIEC IT Handbook
Credit unions NCUA Part 748 security program
Broker-dealers FINRA, SEC FINRA 3110 supervision, SEC 17a-3/4 records
Investment advisers SEC SEC examination, Reg BI compliance
Insurers State regulators NAIC model law, state-specific requirements
NY-licensed entities NYDFS Part 500 cybersecurity requirements

Compliance Requirements

MANDATORY Controls:

Governance Committee Approval

  • AI Governance Lead
  • Compliance Officer
  • CISO
  • Legal/General Counsel
  • Business Owner

Model Risk Management

  • Validation testing
  • Bias testing and fairness assessment
  • Performance monitoring vs. baseline
  • Annual third-party validation (recommended)

Data Security

  • DLP with strictest policies
  • Sensitivity labels mandatory
  • Encryption in transit and at rest
  • Customer-managed keys (recommended)

Audit and Logging

  • 10-year retention with immutable storage
  • Real-time monitoring and alerting
  • Daily compliance reviews
  • Weekly executive reporting

Change Management

  • 48-hour change review window
  • Formal change advisory board (CAB)
  • Automated rollback capability
  • Testing in lower tier before promotion

Incident Response

  • SLA for incident investigation (<4 hours)
  • Root cause analysis required
  • Executive escalation procedures
  • Board notification procedures

Implementation Considerations

  • Formal governance committee established
  • Comprehensive risk assessment completed
  • Model validation documented
  • Security testing completed
  • Legal review and sign-off obtained
  • Training and awareness program implemented
  • Incident response playbooks documented

Zone Progression Model

Agents typically progress through zones as they mature:

Promotion Criteria

Zone 1 to Zone 2:

  • Proof of concept validated
  • Manager approval obtained
  • Data source identified and approved
  • User training completed
  • Incident response procedures documented

Zone 2 to Zone 3:

  • Production readiness testing completed
  • Security assessment passed
  • Model risk validation completed
  • Bias testing results documented
  • Governance committee approval obtained
  • Legal and compliance sign-off received

Demotion/Remediation

If an agent violates governance requirements:

  • Zone 3 to Zone 2: Policy violations, performance issues
  • Zone 2 to Zone 1: Compliance failures, security incidents
  • Suspension: Critical security issues (any zone)

Demotion typically requires:

  • Root cause analysis
  • Remediation plan
  • Re-approval before re-promotion

Zone Decision Matrix

Use this decision tree to determine the appropriate zone for your agent:

Questions to Determine Zone

Question Zone 1 Zone 2 Zone 3
Who uses the agent? Individual only Team/Department Organization-wide
What data accessed? Microsoft Graph only Internal data Regulated/sensitive data
Customer-facing? No No (internal only) Yes or customer data
Regulatory scrutiny? Minimal Moderate High
Business impact if fails? Low - inconvenience Medium - workflow disruption High - financial/reputational
Approval required? Self-service Manager/Dept Head Governance Committee
Audit retention? 30 days 1 year 10 years

Zone Selection Scorecard

Use this scorecard to determine the appropriate zone. Score each factor and total:

Factor Zone 1 (0 pts) Zone 2 (1 pt) Zone 3 (2 pts)
Data Sensitivity Personal/public Internal business Customer/regulated
User Count 1 user 2-50 users 50+ users
Business Impact Inconvenience Workflow disruption Financial/legal
External Access None Internal only Customer-facing
Regulatory Scope None FINRA 3110 Full compliance
Data Sources M365 Graph Internal SharePoint CRM/Financial systems

Scoring:

  • 0-2 points: Zone 1 - Personal Productivity
  • 3-6 points: Zone 2 - Team Collaboration
  • 7+ points: Zone 3 - Enterprise Managed

Automatic Zone Triggers

Certain characteristics automatically require a specific zone:

Trigger Required Zone Rationale
Customer PII accessed Zone 3 GLBA, Reg S-P compliance
Financial transaction data Zone 3 SOX, SEC requirements
Credit/lending decisions Zone 3 ECOA, fair lending
External customer access Zone 3 Full supervision required
Cross-department sharing Zone 2+ Governance oversight
Production deployment Zone 2+ Change control required

Zone-Specific Sharing Controls

Agent sharing and publishing are enforced through individual rules in Environment groups. Configure these rules in PPAC under Manage > Environment groups > [Group] > Rules.

Zone Sharing Recommendations

Zone Editor Sharing Viewer Sharing Authentication
Zone 1 Disabled Disabled Required (prevents bypass)
Zone 2 Enabled Enabled Required (Entra ID)
Zone 3 Disabled* Enabled Required (Entra ID)

*Zone 3 editor sharing disabled to enforce change control - edits go through ALM pipeline.

FSI Note

Always enable authentication for agents in Zones 2-3. Sharing limits are bypassed when authentication is disabled, creating a governance gap.


Channel Access by Zone

Channel Zone 1 Zone 2 Zone 3
Teams + Microsoft 365 Copilot Allowed Allowed Allowed
SharePoint Blocked Allowed Allowed
Dynamics 365 for Customer Service Blocked Blocked Allowed
Direct Line channels Blocked Blocked Allowed*
Facebook Blocked Blocked Blocked**
WhatsApp Blocked Blocked Blocked**

Zone 3 only with security review and approval *External social/messaging channels typically blocked in FSI for compliance

FSI Compliance Note

External channels (Facebook, WhatsApp) require FINRA-compliant archiving and supervision. Most FSI organizations disable these channels unless specific compliance controls are in place per FINRA Rule 3110 and FINRA Regulatory Notice 17-18.


Implementation Guidance by Zone

Zone 1 Setup (1-2 days)

  1. Enable personal environments
  2. Configure basic DLP
  3. Document agent purpose
  4. Train user on best practices

Zone 2 Setup (1-2 weeks)

  1. Establish approval workflow
  2. Configure Managed Environments
  3. Implement DLP policies
  4. Set up audit logging (1-year)
  5. Document compliance procedures
  6. Train team members

Zone 3 Setup (3-6 weeks)

  1. Establish governance committee
  2. Perform model risk assessment
  3. Conduct bias and fairness testing
  4. Implement comprehensive DLP
  5. Configure 10-year audit retention
  6. Deploy runtime protection
  7. Establish incident response
  8. Obtain legal and compliance sign-off
  9. Train governance team and operators

Common Zone Questions

Q: Can an agent be in multiple zones? A: No. Each agent exists in one zone. It may progress to a higher zone as it matures.

Q: What if an agent crosses zone boundaries? A: If a Zone 1 agent needs to access team data, it should be promoted to Zone 2 with appropriate approvals.

Q: How do we prevent zone bypassing? A: Use environment groups, Managed Environments, and DLP policies to enforce zone boundaries technically.

Q: Can we have Zone 1 agents access Zone 3 data? A: No. Zone 1 is restricted to Microsoft Graph. Access to regulated data requires Zone 3.


Quarterly Zone Reviews

Each zone should have recurring compliance reviews:

  • Zone 1: Annual review (if tracked)
  • Zone 2: Quarterly compliance review
  • Zone 3: Monthly review with attestation

FSI Agent Governance Framework v1.2.51 - February 2026