Agentic AI Transformation

Executive-grade guidance for organisations that need to adopt agentic AI safely, calmly and at scale.

L1 detail

Technology

4 Level 2 areas25 Level 3 activities

Linked Level 2 areas

Linked Level 3 activities

Architecture

API design and integration

M

Design APIs for agent orchestration (idempotency, retries, transactional boundaries, compensating actions) rather than simple prompt-in / text-out patterns

Open Level 3 detail

Infrastructure

Cloud provider selection

M

Expand from “LLM hosting capacity” to a portability and lock-in posture - ability to run stateful agent services, policy enforcement, tracing, and connectors across multiple hyperscalers and open-source stacks (eg Kubernetes, portable IAM abstractions, model gateway)

Open Level 3 detail

Data readiness

Data quality management

L

Move from “sufficient for reporting or summarisation” to “sufficient for autonomous action” - standardise critical data elements, enforce validation at ingestion, measure fitness-for-use per workflow, and remediate via automated controls and accountable ownership

Open Level 3 detail

Foundation models

Foundation model vendor selection

S

Evaluate vendors on agentic capabilities (tool-use reliability, function calling, safety controls, provenance/audit features) in addition to output quality

Open Level 3 detail

Data readiness

Data lineage and provenance

L

Extend lineage to cover agent context assembly and tool inputs/outputs, not only dataset lineage

Open Level 3 detail

Foundation models

Fine-tuning and customisation strategy

S

Shift from tailoring tone/accuracy to shaping action policies, tool-selection behaviour, and domain-specific guardrails

Open Level 3 detail

Architecture

Microservices and modular design

M

Modularise capabilities so agents can compose and swap tools/services dynamically, beyond embedding GenAI inside monolith workflows

Open Level 3 detail

Infrastructure

On-premise vs hybrid strategy

M

Extend GenAI placement decisions to where autonomous execution and sensitive tool-actions are permitted, including split-brain patterns (reasoning in cloud, execution on-prem)

Open Level 3 detail

Architecture

Event-driven architecture

M

Shift from “user-triggered GenAI” to agents reacting to events, maintaining state, and initiating multi-step actions automatically

Open Level 3 detail

Foundation models

Model governance and versioning

M

Expand governance from model versions to agent bundles (model + prompts + tools + connectors + permissions + policies + memory/config) with controlled releases and rollbacks

Open Level 3 detail

Infrastructure

Network and storage architecture

M

Upgrade for high-frequency agent calls to tools, vector stores, event buses, and audit stores, not just batch inference traffic

Open Level 3 detail

Data readiness

Privacy and data security

L

Upgrade from prompt/PII controls to continuous privacy enforcement across retrieval, memory, tool calls, and action outputs

Open Level 3 detail

Data readiness

Data accessibility and entitlements

L

Move from user access models to task-scoped, context-aware least privilege for agent identities across domains

Open Level 3 detail

Architecture

Data pipelines and orchestration

L

Evolve pipelines from feeding models to supporting continuous agent context refresh, policy checks, and remediation triggers

Open Level 3 detail

Foundation models

Model performance monitoring

M

Monitor not only quality but goal success, action correctness, tool error rates, boundary violations, and escalation/override patterns

Open Level 3 detail

Infrastructure

Scalability and resilience engineering

L

Engineer for “always-on” agent services with bursts, retries, queueing, back-pressure, and graceful degradation, not just interactive GenAI sessions

Open Level 3 detail

Data readiness

Data preparation pipelines

M

Evolve preparation from batch cleaning to continuous enrichment (metadata, labels, sensitivity tags) that agents can rely on at runtime

Open Level 3 detail

Infrastructure

Infrastructure security and access controls

L

Move from model/API key management to end-to-end identity for agents, tool credentials, least-privilege runtime authorisation, and automated secret rotation

Open Level 3 detail

Architecture

Permissions and access model (RBAC / ABAC)

L

Extend human RBAC into agent identities and fine-grained tool/data entitlements, including per-task scoped permissions and action class constraints

Open Level 3 detail

Architecture

Runtime action ring-fencing and safety wrappers

M

Add hard technical boundaries around what agents can do - tool allowlists, parameter validation, spend/impact limits, jurisdiction constraints, red-line proximity checks, and kill-switch hooks enforced outside the model

Open Level 3 detail

Architecture

DevSecOps control gates in CI/CD

M

Insert policy-as-code and evaluation gates for agent behaviours (tool use, escalation, unsafe actions), not only model quality checks

Open Level 3 detail

Architecture

Secure experimentation sandbox (high-trust build environment)

M

Provide an isolated sandbox lane where teams can prototype agents with temporarily elevated permissions using controlled data and hardened tool stubs, with strict egress controls and full tracing

Open Level 3 detail

Architecture

Fallback and safe-state design

M

Add explicit safe-states, kill-switches, and manual override paths for autonomous execution, not just “model unavailable” handling

Open Level 3 detail

Architecture

Explainability instrumentation and provenance capture

M

Instrument agent runs so “why did it act” can be reconstructed - action rationale capture, evidence linking, step-level traces, and context provenance (not just final outputs)

Open Level 3 detail

Architecture

Evidence automation and compliance reporting pipelines

M

Automate evidence collection from build/run systems (tests, approvals, policies, logs, monitoring) into continuously updated evidence packs

Open Level 3 detail