The COMPEL Glossary Graph visualizes relationships between framework terminology, showing how concepts interconnect across domains, stages, and pillars. Term nodes cluster by pillar affiliation while cross-references reveal semantic dependencies — for example, how risk appetite connects to control effectiveness, model governance, and assurance requirements. This network representation helps practitioners navigate the framework vocabulary and understand that COMPEL terminology forms a coherent conceptual system rather than isolated definitions.
COMPEL Glossary / agentic-risk-tiering
Agentic risk tiering
The mapping of an agent's autonomy level, operating domain, and potential-harm profile to a risk tier that determines control requirements — approval depth, oversight mode, audit cadence, insurance, and kill-switch provisioning.
What this means in practice
COMPEL's agentic risk tiering overlays EU AI Act Annex III classifications with operational-impact signals specific to agents.
Synonyms
agentic risk classification , agent-tier mapping
See also
- Agent autonomy spectrum — The continuum along which agentic AI systems operate — from single-turn assistance through tool-augmented reasoning to fully autonomous multi-step execution — typically described with named gradations (Level 0 through Level 5).
- High-risk AI system — Under Regulation (EU) 2024/1689, an AI system falling under Article 6(1) because it is a safety component of, or is itself, a product covered by Annex I Union harmonization legislation, or under Article 6(2) because its use case falls within Annex III — unless exempted by the Article 6(3) derogation..
- Human oversight (Art. 14) — Under Regulation (EU) 2024/1689, the provider-designed measures that allow natural persons to understand the capacities and limitations of a high-risk AI system, monitor its operation, and intervene or interrupt it.
- Agent Governance Pack — An executive-grade, living artefact aggregating all governance records for a deployed agent — autonomy classification, delegation and authority chain, oversight design, tool bindings, memory scope, kill-switch wiring, risk tier, incident history, and named owners.