What Drel ships for an AI Committee.
A real example of the Risk Disposition memo Drel builds for an enterprise procurement agent with RAG, tools and MCP. Required controls, evidence gaps, residual risk and re-assessment triggers — in one regulator-facing artifact. Read it, share the URL, or download the Markdown for your AI Committee.
- System
- Enterprise Procurement Agent
- Type
- Agentic system with RAG, tools and MCP
- Lifecycle stage
- Restricted pilot
- Decision
- Restricted pilot only
ProcureAssist can drive measurable value for procurement, but it ingests untrusted supplier content, holds over-scoped tool access, and lacks an immutable audit trail and a deterministic policy enforcement point. A restricted pilot inside the procurement department is acceptable with mandatory human assessment on every contract recommendation. Full production is blocked until policy enforcement, immutable tool-call logging, MCP descriptor signing and on-behalf-of delegation are evidenced.
- Per-action authorisation for supplier_lookup scoped to current opportunitySecurity Architecture · 2026-06-15
- Deterministic policy enforcement point before email_send and contract_recommendSecurity Architecture · 2026-07-01
- RAG ingestion validation and supplier proposal quarantineAI Governance · 2026-06-30
- Per-action authorisation for supplier_lookup scoped to current opportunitySecurity Architecture · Required
- Deterministic policy enforcement point before email_send and contract_recommendSecurity Architecture · Required
- RAG ingestion validation and supplier proposal quarantineAI Governance · Planned
- +5 more
- Audit logging design for tool calls and reasoning traces is not documented.Architecture proposal due 2026-06-15; sample logs by 2026-07-01.
- MCP server identity delegation model is not specified.Identity flow specification under Security Architecture lead by 2026-06-30.
- Approval boundary logic is not implemented in code.Policy engine implementation in front of email_send and contract_recommend.
Code assessment of authorisation middleware, plus test cases that attempt cross-opportunity reads and expect denial.
Ingestion test suite with adversarial proposal corpus; manual assessment of quarantine queue weekly during pilot.
Workflow audit confirming no contract_recommend output is finalised without two named human reviewers.
Penetration test attempting cross-session retrieval; assessment of memory store data model.
Threat-driven test suite covering deal-value bypass, sensitive recipient class, and out-of-scope analyst combinations; expected denials are logged and reviewed.
Audit log integrity test; sample reconstruction of a procurement flow end-to-end without source-system access.
Signature validation test on agent startup; tampering attempt simulated and rejected.
Identity flow assessment; trace inspection showing scoped tokens on all MCP calls.
- InferredRR-1Indirect prompt injection through supplier proposals can still influence email drafts during the pilot, even with quarantine.Acceptance ownerAI GovernanceConditionAcceptable only while every email_draft is reviewed by an analyst before send.
- AssumedRR-2Cross-supplier visibility in supplier_lookup remains until per-action authorisation ships.Acceptance ownerBusiness OwnerConditionAcceptable only inside the pilot scope; revoked on first exception.
- Missing evidenceRR-3Audit reconstruction of agent reasoning is not yet possible.Acceptance ownerCISO delegateConditionAcceptable only until audit log control C-5 is verified, with monthly assessment.
- Missing evidenceEG-1Audit logging design for tool calls and reasoning traces is not documented.Closure plan: Architecture proposal due 2026-06-15; sample logs by 2026-07-01.
- Missing evidenceEG-2MCP server identity delegation model is not specified.Closure plan: Identity flow specification under Security Architecture lead by 2026-06-30.
- Missing evidenceEG-3Approval boundary logic is not implemented in code.Closure plan: Policy engine implementation in front of email_send and contract_recommend.
- UnknownEG-4Cross-tenant policy isolation in the vector index is not validated.Closure plan: Tenant isolation validation report from platform team.
- UnknownEG-5Cross-session memory isolation is not verified.Closure plan: Pen test scheduled with security testing partner.
- TR-1Move from restricted pilot to general availability.active
- TR-2Add a new tool to ProcureAssist.active
- TR-3Change of underlying model (e.g., Azure OpenAI version upgrade).active
- TR-4Expand to additional business units or geographies.active
- TR-5Vendor change for the internal-procurement MCP server.active
- TR-6Increase autonomy (auto-send emails without analyst assessment).active
- SASecurity ArchitectureRequires changesL. Bauer · 2026-04-29Approves restricted pilot only. Production gate blocked until C-2, C-5, C-7, C-8 verified.
- AGAI GovernanceApprovedM. Janssen · 2026-04-30Pilot scope acceptable. Re-assessment on any tool, model or scope change.
- DDPOAssessment requiredS. Vermeer · 2026-04-30Awaits cross-tenant policy isolation evidence and email content assessment process.
- BOBusiness OwnerApprovedK. Roth · 2026-04-29Accepts pilot conditions and mandatory HITL on contract recommendations.
- CDCISO delegatePendingJ. HalászPending evidence on audit logging and policy enforcement before sign-off.
This memo, required controls, residual risk, evidence gaps, re-assessment triggers and sign-off log are versioned in the audit bundle.
How to read this: the disposition reflects the assessed system and documented assumptions at the time of review. Drel does not ingest live telemetry — re-assessment triggers above describe when the disposition must be revisited.
Want this for your AI Committee?
Drel is in early access. Get in touch to be among the first teams to use it.