Share this
What to Consider When Building Trustworthy AI Agents
by Marc de Haas on Mar 5, 2026 10:43:22 AM

This is Part 1 of our Grounded, Guarded, Governed series on building trustworthy agentic systems. Coming soon: Part 2 on observability, and Part 3 on human oversight.
As AI systems become more autonomous, the question isn’t ‘what can they do’, but rather, ‘how can we keep them under control once they start making decisions on their own?’ Teams that scale agentic AI successfully usually treat governance the same way they treat data quality or security, meaning it becomes part of the operating model instead of an afterthought.
Agentic AI introduces incredible potential, but also new responsibility. It requires the three pillars of any trustworthy system: safety, transparency, and human oversight.
Building trustworthy agents means thinking about control early, not after deployment. It’s about defining who can access what data, how often logs are reviewed, and where approval checkpoints live. The most successful AI systems are the ones designed with governance integrated.
Guardrails by Design: Why Autonomy Needs Boundaries
Think of a “bodyguard agent”: a system that checks every prompt and response before it reaches production tools. It acts as a filter, making sure agents don’t execute actions outside approved boundaries.
In practice, this can look like an approval matrix that maps specific tools or datasets to specific roles, making sure agents cannot escalate their own privileges or operate outside the scope they were explicitly assigned.
At the prompt level, intent is classified. Is the agent attempting to read data, write data, trigger an execution, or communicate externally? Is the target internal, client-specific, or production-wide? If the intent does not align with the agent’s role, execution stops there.
When an agent plans its tool usage, the plan itself is validated. Tool chaining is checked explicitly to prevent quiet privilege escalation. An agent is not allowed to combine individually harmless actions into something powerful by accident or by design.
During execution, every tool call is evaluated in real time. Parameters, scopes, environments, and dataset boundaries are re-validated on each call. The system does not assume the agent reasoned correctly earlier. Policy is enforced at the moment it matters.
Approval Matrices: Who Can Do What, and Why That Matters
An approval matrix is a concrete mapping of roles to tools, datasets, and risk levels. A coding agent might generate code, open pull requests, or trigger tests, but it cannot deploy to production or modify infrastructure.
A business agent may query analytics, draft recommendations, or prepare reports, but it cannot change source data or trigger financial workflows.
A client-facing agent is restricted to a single customer context. Hard tenant boundaries apply, without exceptions or workarounds.
Internal agents typically act with the same rights as the employee using them. The agent does not get superpowers. It borrows the user’s access and nothing beyond that.
Out-of-the-box matrices usually cover common enterprise roles. From there, teams extend them per project, per client, or per regulatory environment. For sensitive or classified data, the matrix can also define who must be informed or approve an action before it runs.
The critical point is that permissions are explicit and static. Agents cannot infer new rights, inherit access through delegation, or promote themselves because it “made sense in context.”
Risky Actions: Measured by Impact, Not Complexity
Risk is not about technical complexity, it is about blast radius. Anything that changes money, deletes data in bulk, modifies infrastructure, or triggers downstream systems is high-risk.
Any communication that reaches end customers is also high-risk by default. If an action is expensive (or impossible) to reverse, it should not be one prompt away from execution.
Lower-risk actions tend to be read-only queries, summarisation, or drafting content that stays within internal workflows. The bodyguard agent uses this classification to decide whether an action is allowed, requires human approval, or must be blocked outright.
Multi-agent Systems Raise the Stakes
As teams move toward multi-agent setups, capabilities scale quickly. One agent plans, another executes, another monitors or validates. That only works if guardrails scale with them. The bodyguard agent becomes the constant across agent handoffs, enforcing boundaries and preventing privilege escalation through delegation.
This is the next step in agent evolution: more autonomy, more capability, and significantly more responsibility. Teams that design guardrails early are the ones that can afford to move fast later.
Building for Control, Not Chaos
Agentic AI will continue to evolve rapidly. The question is not how to stop it, but how to build for control, not chaos.
By integrating governance, establishing clear observability, and keeping humans in the loop, organisations can embrace autonomy without losing accountability. Because in the end, trust isn’t built through technology alone, it’s built through transparency, control, and shared responsibility.
Discover More in Our Podcast: Taming the Agent
Hear our full conversation on designing guardrails, observability, and human oversight in the first episode of our podcast, Crystal Clear. The two hosts, Kevin and Marc, discuss how enterprises can move beyond proof-of-concept AI and build agentic systems that are capable and controlled.
Listen Now
Share this
- February 2026 (4)
- January 2026 (2)
- December 2025 (2)
- November 2025 (2)
- October 2025 (2)
- September 2025 (3)
- August 2025 (2)
- July 2025 (1)
- June 2025 (1)
- April 2025 (4)
- February 2025 (2)
- January 2025 (3)
- December 2024 (1)
- November 2024 (5)
- October 2024 (2)
- September 2024 (1)
- August 2024 (1)
- July 2024 (4)
- June 2024 (2)
- May 2024 (1)
- April 2024 (4)
- March 2024 (2)
- February 2024 (2)
- January 2024 (4)
- December 2023 (1)
- November 2023 (4)
- October 2023 (4)
- September 2023 (4)
- June 2023 (2)
- May 2023 (2)
- April 2023 (1)
- March 2023 (1)
- January 2023 (4)
- December 2022 (1)
- November 2022 (4)
- October 2022 (3)
- July 2022 (1)
- May 2022 (2)
- April 2022 (2)
- March 2022 (5)
- February 2022 (2)
- January 2022 (5)
- December 2021 (5)
- November 2021 (4)
- October 2021 (2)
- September 2021 (1)
- August 2021 (3)
- July 2021 (4)
- May 2021 (2)
- April 2021 (1)
- February 2021 (2)
- December 2020 (1)
- October 2020 (2)
- September 2020 (1)
- August 2020 (2)
- July 2020 (2)
- June 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- November 2019 (3)
- October 2019 (2)
- September 2019 (3)
- August 2019 (2)
- July 2019 (3)
- June 2019 (4)
- May 2019 (2)
- April 2019 (4)
- March 2019 (2)
- February 2019 (2)
- January 2019 (4)
- December 2018 (2)
- October 2018 (1)
- September 2018 (2)
- August 2018 (2)
- July 2018 (1)
- May 2018 (2)
- April 2018 (4)
- March 2018 (5)
- February 2018 (1)
- January 2018 (3)
- November 2017 (2)
- October 2017 (2)




