Chapter 06 of 08

The Implementation Playbook

Five phases from assessment to federation. Role-by-role guidance. Concrete timelines. The plan your steering committee signs off on.

This chapter translates the architecture (Chapter 5) and regulatory requirements (Chapter 4) into an actionable implementation plan. It's designed for the program manager who needs to present a timeline to the steering committee, the CISO who needs to know when controls go live, the CIO who needs to report progress to the board, and the platform team that needs to know what to build and when.

Two paths, one destination

Platform-assisted path: Deploy a managed agent platform with built-in governance. Skip from Phase 0 to Phase 2 in days. Level 3 on day one, Level 4 within weeks. This is the path for organizations that want speed.

Build path: Assemble governance infrastructure from components. Expect 6-12 months and 3+ FTEs for Level 3, with Level 4 as a multi-quarter initiative. This is the path for organizations with unique constraints that no platform addresses.

Chapter 8 (Decision Framework) helps you choose between them.


PHASE 0

Assessment

Duration: 1-2 weeks  |  Maturity level: L1 → L1 (no change yet)  |  Deliverable: Governance readiness report

Before deploying anything, understand where you are. Phase 0 produces the baseline assessment that justifies the investment and scopes the project.

Activities

  • Shadow AI inventory: Survey employees. Check expense reports for AI subscriptions. Audit DNS and network logs for AI API traffic. The goal isn't to punish — it's to understand the actual state.
  • Maturity assessment: Use the Chapter 2 matrix or the interactive assessment tool. Score each dimension. Identify the weakest links.
  • Regulatory mapping: Which frameworks apply to your organization? Use Chapter 4 tables. Map current controls to requirements. Identify gaps.
  • Stakeholder alignment: Brief the CISO, CIO, and at least one business unit leader. The business unit provides the first use case. The CISO provides the security requirements. The CIO provides the platform decision authority.
  • Risk appetite definition: What enforcement mode will you start with? (Recommendation: warn for the first 2 weeks.) What's the maximum acceptable risk from a shadow AI incident during the transition?

CISO

  • Review shadow AI findings
  • Define security requirements
  • Set initial enforcement mode
  • Approve the governance scope

CIO

  • Sponsor the initiative
  • Allocate platform budget
  • Select platform path (buy vs build)
  • Designate platform team lead

Platform Team

  • Run shadow AI inventory
  • Evaluate platform options
  • Document current integrations
  • Plan SSO/SCIM integration

Business Owner

  • Identify first use case
  • Define success metrics
  • Designate pilot team
  • Commit to 2-week pilot

PHASE 1

Foundation

Duration: 1-2 weeks  |  Maturity level: L1 → L3  |  Deliverable: Platform deployed with first team running

Deploy the governance platform and get the first team operational. On a managed platform, this is days, not months. The goal: every agent has an identity, every tool call is authorized, every action is audited.

Activities

  • Platform deployment: Connect SSO provider (SAML/OIDC). Configure SCIM for automated user provisioning. Set BYOK API keys for your LLM provider(s).
  • First workspace: Create a workspace for the pilot business unit. Configure the workspace briefing (context that flows to all teams).
  • First team: Deploy from a team blueprint (23 pre-designed options) or custom-build. Run the Team Starting Wizard: auto-discovery, charter generation, human approval, agent handshakes.
  • Connect integrations: Google Workspace, Microsoft 365, HubSpot, Salesforce, GitHub — whatever the pilot team needs. OAuth-based, scoped per team.
  • Enforcement mode: warn: Authorization checks run, warnings logged, nothing blocked yet. This builds confidence that governance doesn't break the workflow.

The "Day 1" checklist

At the end of Phase 1, you should be able to answer "yes" to all of these:

  • Every agent has a unique SPIFFE identity
  • Every tool call is logged with actor, target, action, result, and cost
  • You can kill any agent in seconds from the dashboard
  • The CISO can view the audit trail for any agent action
  • LLM calls go through the Gateway pipeline (PII redaction, prompt injection detection)
  • Total cost per agent, per team, per tenant is visible

PHASE 2

Governance Activation

Duration: 2-4 weeks  |  Maturity level: L3 → L4  |  Deliverable: Enforcement mode active, compliance packs enabled

Phase 2 transitions from monitoring to enforcement. The 2-week warn period from Phase 1 has given you visibility into what agents actually do. Now you tighten controls based on evidence, not assumptions.

Activities

  • Review warn logs: Analyze authorization warnings from Phase 1. Fix legitimate access gaps (agents that need permissions they don't have). Identify actual policy violations vs. configuration errors.
  • Enable enforcement: Move from warn to enforce for the pilot team. Authorization denials now block the tool call. Monitor for false positives in the first 48 hours.
  • Activate governance packs: Enable the compliance packs for your regulatory requirements (GDPR, HIPAA, SOX, etc.). This auto-activates: PII detection, encryption at rest, specific approval workflows, audit retention policies.
  • Configure data protection: Enable BYOS if required (Enterprise). Configure encryption key management (platform-managed or customer KMS). Verify data residency compliance.
  • Compliance report: Generate the first compliance report (PDF). Review with the CISO. This becomes the baseline for future audits.

CISO

  • Review warn-period findings
  • Approve enforcement activation
  • Sign off on compliance report
  • Configure SIEM integration

Platform Team

  • Fix authorization gaps from warn logs
  • Enable governance packs
  • Configure encryption + BYOS
  • Set up compliance reporting

PHASE 3

Scale

Duration: Ongoing  |  Maturity level: L4 (maintained)  |  Deliverable: Multiple teams, multiple workspaces, operational governance

With governance proven on the pilot team, scale to additional business units. Each new team follows the same pattern: deploy from blueprint, run Starting Wizard, 2-week warn period, then enforce.

Activities

  • Onboard additional teams: Sales, Support, Marketing, Engineering, Compliance — each as a governed team with their own workspace, agents, and integrations.
  • Custom MCP servers: Register team-specific tools (internal APIs, databases, custom systems). Sandbox-test before production.
  • Policy refinement: As more teams onboard, governance policies get pressure-tested. Refine cascading policies at workspace and team level.
  • Access reviews: Run the first SOC 2-style access review campaign. Verify that agent permissions match current needs. Remove stale grants.
  • Continuous compliance: Schedule recurring compliance reports. Configure alert rules for policy violations. Integrate with your GRC tool.

PHASE 4

Federation

Duration: When ready  |  Maturity level: L4 → L5  |  Deliverable: Cross-org agent collaboration

Federation is optional. Most organizations will reach Level 4 and operate there successfully for months before considering cross-org collaboration. When the ecosystem matures (SLIM, A2A, AGNTCY standards stabilize further), Phase 4 extends governance across organizational boundaries.

Activities

  • Establish trust: Exchange SPIFFE trust bundles with partner organizations. Define bilateral trust relationships with explicit scope and expiry.
  • Configure federation bridge: Enable cross-org message routing with encryption, audit, and circuit breaker protection.
  • Cross-org authorization: Define what partner agents can do in your environment via TBAC (Tool-Based Access Control). Scoped, time-limited, auditable delegation.
  • Federated audit: Ensure both organizations maintain complete records. Correlate cross-org events for incident investigation.

Timeline Summary

IMPLEMENTATION TIMELINE — PLATFORM-ASSISTED PATH PHASE 0 Assessment 1-2 weeks L1 → L1 PHASE 1 Foundation 1-2 weeks L1 → L3 PHASE 2 Governance 2-4 weeks L3 → L4 PHASE 3 Scale Ongoing L4 PHASE 4 Federation When ready L4 → L5 4-8 weeks to Level 4 (platform-assisted)
PhaseDurationMaturityKey Deliverable
Phase 0: Assessment1-2 weeksL1 → L1Governance readiness report
Phase 1: Foundation1-2 weeksL1 → L3First team running with identity, authz, audit
Phase 2: Governance2-4 weeksL3 → L4Enforcement active, compliance packs, first report
Phase 3: ScaleOngoingL4Multiple teams, access reviews, continuous compliance
Phase 4: FederationWhen readyL4 → L5Cross-org collaboration with trust verification

Total time from zero to Level 4: 4-8 weeks (platform-assisted) or 6-18 months (build). The platform-assisted path is faster because the infrastructure exists — you're configuring and activating, not building.


Common Failure Modes

Governance initiatives fail for predictable reasons. Avoid these:

Starting with enforcement (bypassing warn period)

Agents break immediately. Teams lose trust in governance. The initiative gets shelved. Always start with warn mode and collect evidence before enforcing.

Trying to govern everything at once

Boil-the-ocean governance programs stall in committee. Start with one team, one use case, one regulatory framework. Expand once the pattern is proven.

Treating governance as a project, not a function

Governance is not a one-time implementation — it's an ongoing operational function. Access reviews, policy updates, compliance reports, and incident response are continuous. Budget for ongoing operations, not just initial deployment.

No business owner sponsorship

Governance imposed by IT without business buy-in creates friction and workarounds. The first pilot must be championed by a business unit leader who sees the value, not just the controls.


Chapter Summary

The implementation playbook follows five phases: Assessment (understand where you are), Foundation (deploy platform, first team), Governance Activation (enforcement, compliance packs), Scale (multiple teams, continuous compliance), and Federation (cross-org, when ready). The platform-assisted path gets from Level 1 to Level 4 in 4-8 weeks. The critical success factor is starting with warn mode, proving governance doesn't break production, and then tightening progressively based on evidence.

The next chapter maps the Standards Landscape — MCP, A2A, SLIM, OASF, and how they compose into the Internet of Agents.