Standard Conformance Quickstart¶
Standard-profile alpha governance for interactive applications and user-facing systems.
- Claimable now: Standard
- Optional additive badge: Regulated Controls Badge
- Non-conformant runtime mode: Dev Mode
- Future profile track: Safety-Critical (not claimable in alpha)
Python is the canonical alpha runtime evaluator. If your application runtime is not Python, emit traces and evidence locally and call a supported evaluator service for governance execution.
The trace-to-decision walkthrough uses the same canonical source-blueprint and trace vocabulary shown here, then layers the service-bound deployment artifact chain around that evaluation.
Production Profile
Designed for: Production apps and interactive systems
Performance: Typical 50ms-300ms governance path at Governance Tier GT-2/GT-3
Features: Full intervention model, tripwires, trust debt, persistent auditability
What You Get¶
Standard conformance adds production-critical controls while keeping latency predictable.
SDK naming
The SDK parameter conformance_level="standard" maps to Standard Profile.
| Feature | Dev Mode | Standard |
|---|---|---|
Core policy (checks, tripwires, intervention_policy) |
[YES] | [YES] |
| All intervention handling | [LIMITED] | [YES] |
| Trust debt controls | [NO] | [YES] |
| Persistent auditability | [NO] | [YES] |
| Optional Runtime Governance Contracts extension | [NO] | [OPTIONAL] |
Time to implement: 1-2 days
Minimal Useful Standard Implementation¶
The smallest useful Standard deployment is:
- one Governance Steward
- one Operating Agent runtime
- one active baseline blueprint
- deterministic checks and tripwire evaluation
- CTQ aggregation using the five standard metrics
- threshold mapping and orthogonal flag support
- default trust debt provider behavior
- Governance Store or equivalent durable governance persistence
For the normative baseline and scorer-processing note, see ACGP-3.
For non-Python deployments, keep this same minimal baseline behind an evaluator service rather than trying to run local TypeScript runtime evaluation.
Step 1: Install¶
Step 2: Create a Normative Standard Blueprint¶
Use the canonical Blueprint source shape (artifact_type, schema_version, checks, intervention_policy.thresholds, tripwires, trust_policy).
artifact_type: acgp.blueprint
schema_version: "2.0.0"
id: customer-support/standard@2.0
version: "2.0.0"
title: "Customer support standard blueprint"
description: "Standard governance policy for customer support automation"
applicability:
governance_tiers: ["GT-2", "GT-3"]
checks:
- id: refund_reason_quality
kind: metric
when:
hook: tool_call
tool: issue_refund
metric:
name: reason_quality
weight: 0.55
evaluator:
kind: rule-based
args:
mode: all
rules:
- id: refund_reason_present
field: parameters.reason
operator: exists
- id: refund_reason_descriptive
field: parameters.reason
operator: regex
value: ".{25,}"
- id: amount_consistency
kind: metric
when:
hook: tool_call
tool: issue_refund
metric:
name: amount_consistency
weight: 0.45
evaluator:
kind: source-match
args:
require_order_match: true
intervention_policy:
thresholds:
ok: 0.25
nudge: 0.40
escalate: 0.55
tripwires:
- id: daily_refund_limit
when:
hook: tool_call
tool: issue_refund
condition: "daily_refunds > 5000"
eval_tier: 0
on_fail:
decision: halt
reason: "Daily refund limit exceeded"
- id: high_value_refund
when:
hook: tool_call
tool: issue_refund
condition: "args.amount > 100000"
eval_tier: 1
on_fail:
decision: escalate
reason: "High-value refund requires approval"
trust_policy:
enabled: true
accumulation:
ok: 0.0
flag: 0.10
nudge: 0.50
escalate: 1.00
block: 2.00
halt: 5.00
decay:
decay_fraction: 0.05
period_hours: 24
min_debt: 0.0
thresholds:
elevated_monitoring: 0.30
restricted_mode: 0.50
re_tiering_review: 0.75
Step 3: Evaluate Traces and Handle Outcomes¶
from acgp import GovernanceSteward, CognitiveTrace, PostgresStateStorage
steward = GovernanceSteward.production(
blueprint_file="blueprint.yaml",
state_storage=PostgresStateStorage(connection_string="postgresql://runtime/acgp"),
)
trace = CognitiveTrace(
reasoning=(
"Customer requested refund for defective product. "
"Order #12345 was delivered 5 days ago and qualifies under policy."
),
action="issue_refund",
parameters={"order_id": "12345", "amount": 250.0, "reason": "defective_product"},
confidence=0.92,
governance_tier="GT-3",
)
result = steward.evaluate(trace)
if result.intervention == "ok":
issue_refund(250.0, "12345")
elif result.intervention == "nudge":
log.info("Nudge: %s", result.message)
issue_refund(250.0, "12345")
elif result.intervention == "escalate":
approval = request_human_approval(trace, result)
if approval.approved:
issue_refund(250.0, "12345")
elif result.intervention == "block":
notify_customer(f"Cannot process refund: {result.message}")
elif result.intervention == "halt":
notify_ops_team("Agent halted due to critical violation")
raise RuntimeError(result.message)
# Orthogonal flag handling (flag is not a primary decision value on the wire)
if result.flags and result.flags.flagged:
audit.flag_for_review(trace, result.flags.reason)
Use GovernanceSteward(...) for development, test, or advanced bootstrap flows. Standard production examples should start from GovernanceSteward.production(...) so durable runtime state is explicit.
Step 4: Optional Runtime Governance Contracts Extension¶
Runtime Governance Contracts are optional in Standard and currently an extension surface.
They add per-evaluation timeout policy for negotiated latency budgets. Core v1.0 profile-failure fallback for Steward/session-path unavailability remains separate.
governance_contract:
risk_level: elevated_risk
eval_tier: 1
performance_budget:
latency_budget_ms: 300
fallback_on_timeout: cached_decision
tier_budgets:
tier_0: 50
tier_1: 250
Use contracts when you need action-specific latency/risk tuning; otherwise Standard policy works without them.
v1.0 conformance boundary
Eval Tier 2 remains reserved for v1.0 conformance validation. If implemented, treat Tier 2 usage as non-normative extension behavior.
Standard Deployment Checklist¶
- Use canonical blueprint fields for the current Blueprint contract
- Handle Standard intervention outcomes with explicit escalation, block, and halt paths
- Integrate persistent storage and monitoring
- Add Runtime Governance Contracts only if you need per-action latency negotiation
One Concrete Artifact Chain¶
If you want one complete request-to-audit example before wiring your own system, use the Trace to Decision Walkthrough.
It includes:
- one blueprint artifact
- one trace request artifact
- one decision artifact
- one orthogonal flag artifact
- one trust-debt update artifact
- one audit record artifact
Next Steps¶
-
Performance Tuning
Optimize evaluation latency and throughput under production load
-
Trace to Decision Walkthrough
One stitched request-to-audit example using the supported evaluator-service path
-
Security Hardening
Deployment-level hardening checklist and operational safeguards