Quickstart Guide

Getting Started with ACR

Deploy the ACR Runtime Control Plane in 4 weeks using a structured pilot plan. Includes use case walkthroughs, Python SDK integration patterns, and the open-source reference implementation.

Docker + Docker Compose

Control plane runs as containerized services

Git

To clone the reference implementation repository

Port 8000 accessible

Agents must reach the ACR API endpoint

Outbound internet (install only)

One-time setup to pull container images

Step 0

Quick Deploy

Get the ACR control plane running in under 5 minutes with the reference implementation.

Terminal
# 1. Clone the repository
git clone https://github.com/AdamDiStefanoAI/acr-framework
cd acr-framework/implementations/acr-control-plane

# 2. Start the control plane
docker-compose up -d

# 3. Verify health (MANDATORY before proceeding)
curl -X POST http://localhost:8000/acr/health \
  -H "Content-Type: application/json" \
  -d '{"version":"1.0"}'
# Expected: {"status":"healthy"}

# 4. Open the operator console
# Navigate to http://localhost:8000/console
The reference implementation uses docker-compose, which is appropriate for development, pilot, and single-node testing. Production enterprise deployments require additional HA, Kubernetes, and TLS configuration. See Control Plane Architecture for production patterns.
Adoption Playbook

4-Week Pilot Plan

A structured pilot designed to run in parallel with existing operations. No existing agent behavior changes in Week 1. ACR deploys in observation mode, with enforcement activating progressively.

Week 1Deploy & Validate

Platform Team

Key Deliverable

Control plane live, health check passing, console accessible

Success Criteria

Health check returns {"status":"healthy"} and all team members can access the console.

Tasks
  • Clone repository: github.com/AdamDiStefanoAI/acr-framework
  • Deploy using docker-compose up -d (reference implementation)
  • Validate health check: curl to /acr/health returns {"status":"healthy"}
  • Open operator console and confirm accessibility for all pilot team members
  • Schedule kickoff meeting with all pilot teams
  • Document deployment configuration and any environment-specific changes
Week 2Register & Instrument

BU Owners + Developers

Key Deliverable

3+ agents registered, code instrumented, policies submitted

Success Criteria

Operator console shows agent activity with actions appearing in the action log.

Tasks
  • BU Owners register minimum 3 agents (1 customer support, 1 internal ops, 1 SecOps recommended)
  • BU Owners submit policy YAML for each agent
  • Platform converts YAML to Rego and deploys policies
  • Developers instrument agent code using the Python SDK
  • Test each agent in staging and verify actions appear in the console action log
  • Identify any no-code agents that cannot be instrumented (log as gap items)
Week 3Monitor & Tune

Security Operations

Key Deliverable

Baseline established, first drift/block events reviewed, false positive rate measured

Success Criteria

Block rate below 5%; at least one real exception reviewed and dispositioned.

Tasks
  • Review all actions in the console daily
  • Adjudicate any blocked actions: approve legitimate ones, confirm blocks are correct
  • Measure false positive rate (legitimate actions incorrectly blocked)
  • Work with BU Owners to tune policies that generate excessive false positives
  • Confirm drift detection baselines are establishing correctly
  • Test kill switch: activate on a non-production agent, verify response time
Week 4Report & Decide

All Teams + CISO

Key Deliverable

Compliance evidence bundle, pilot report, go/no-go for production rollout

Success Criteria

CISO reviews evidence; program approved for production expansion.

Tasks
  • Export compliance evidence bundle for all pilot agents and actions
  • Compile pilot metrics: agents registered, actions evaluated, blocks, drift events, SLA compliance
  • Document all known gaps encountered during the pilot
  • Present findings to CISO and leadership
  • Decision: proceed to production rollout, extend pilot, or address gaps first
  • If proceeding: draft production deployment plan

What Good Looks Like at Week 4

  • 100% of registered agents visible in the operator console
  • All sensitive actions passing through ACR trust path evaluation before execution
  • Human approval workflows operational for high-risk actions
  • Behavioral baseline established for each agent with drift detection active
  • Full audit trail available for compliance evidence export
  • Kill-switch tested and confirmed operational
Use Case Walkthroughs

Worked Examples

Two production-ready use cases that demonstrate ACR governing real enterprise agents. Each includes the scenario, agent policy, and runtime behavior.

Customer Support Agent

BU Owners, Product Managers, Support Operations

A customer support AI agent handles inbound requests. It queries the CRM, looks up order history, sends emails, and creates support tickets. For refund requests over $100, a human must review and approve before the refund is issued.

Without ACR

The agent can issue refunds of any size with no oversight, no audit trail, and no approval gate.

With ACR

Every action passes through the control plane. Refunds over $100 are automatically routed to the BU owner for approval. Everything is logged with evidence bundles.

Sample Policy
agent_id: "support-001"
purpose: "customer_support"
allowed_tools:
  - query_customer_db
  - send_email
  - create_ticket
blocked_tools:
  - bulk_export
  - delete_customer_record
human_approval_required:
  - action: issue_refund
    condition: amount_cents > 10000
    approver: [email protected]
    sla_minutes: 60

Incident Response Agent

Security Operations, SecOps Engineers, CISO

A SecOps triage agent triages incoming alerts. It queries logs, creates tickets, and runs read-only investigative queries automatically. Host isolation requires confidence above 90%. Below that threshold, a human SecOps engineer must approve.

Without ACR

The agent can isolate hosts autonomously at any confidence level, with no containment safeguards if behavior escalates.

With ACR

ACR gates remediation actions on confidence thresholds. Below 90%, actions are held for human approval. Drift detection triggers containment if the agent attempts mass isolation.

Sample Policy
agent_id: "secops-001"
purpose: "incident_response"
allowed_tools:
  - create_ticket
  - read_only_log_queries
  - enrich_indicator
conditional_tools:
  - action: isolate_host
    condition: confidence >= 0.9
    otherwise: human_approval_required
blocked_tools:
  - delete_logs
  - modify_firewall_rules
drift_alert:
  threshold: 3
  action: contain_to_read_only
Developer Guide

Python SDK Integration

Add ACR governance to your Python agent in about 15 lines per sensitive action. Install with pip install acr-client, then use the pattern below.

Python Integration Pattern
from acr_client import ACRAgent

agent = ACRAgent(
    agent_id="support-001",
    acr_endpoint="http://your-acr-url:8000"
)

# Evaluate before every sensitive action
decision = agent.evaluate({
    "action": "issue_refund",
    "parameters": {
        "amount_cents": 15000,
        "customer_id": "cust_abc123",
        "order_id": "order_456"
    },
    "context": {
        "intent": "customer_request",
        "session_id": "sess_789"
    }
})

if decision["disposition"] == "ALLOW":
    result = crm.issue_refund(
        customer_id="cust_abc123",
        amount_cents=15000,
        acr_token=decision["authority"]
    )
    agent.log_outcome(result, decision["evidence_id"])

elif decision["disposition"] == "APPROVAL_REQUIRED":
    print(f"Pending approval. Ref: {decision['evidence_id']}")

elif decision["disposition"] == "DENY":
    print(f"Blocked: {decision['reason']}")
    agent.log_outcome({"status": "blocked"}, decision["evidence_id"])
Always fail closed. If ACR is unreachable, do not proceed with the sensitive action. An agent that bypasses ACR when it is unavailable defeats the purpose of governance.
Open Source

Reference Implementation

The full ACR control plane reference implementation is open-source under Apache 2.0. Includes the control plane API, policy engine (OPA/Rego), operator console, audit log, drift detection, and kill switch.

View on GitHub