OC-301h · Module 2
Containment Strategies
3 min read
Containment stops the bleeding. For agent systems, containment is not just stopping the broken service — it is stopping the broken agent from taking more actions, delivering more output, and influencing more downstream processes. The containment strategy depends on the incident type.
Agent pause: halt the affected agent immediately. No new tasks, no output delivery, no autonomous decisions. Use when the agent is producing bad output or making wrong decisions. Output quarantine: the agent continues processing but all output is held in a quarantine queue for human review before delivery. Use when you suspect quality degradation but are not certain. Scope restriction: reduce the agent's operating authority — disable self-modification, disable autonomous actions, require human approval for all decisions. Use when the agent's decision-making is compromised but its output is still needed. Network isolation: disconnect the agent from other agents and external systems. Use when there is risk of contaminated output spreading to downstream systems.
- 1. Choose Containment Level Agent pause for confirmed incidents (SEV-1, SEV-2). Output quarantine for suspected incidents (SEV-3). Scope restriction for decision failures. Network isolation for data contamination. Choose based on incident type and severity.
- 2. Execute Within SLA SEV-1: containment within 5 minutes. SEV-2: within 30 minutes. SEV-3: within 4 hours. The containment SLA is the maximum acceptable detection gap extension.
- 3. Verify Containment After executing containment, verify it is effective: the agent is no longer producing output, the quarantine is holding deliveries, the scope restriction is enforced. Containment that is not verified is assumed ineffective.