Skip to content

Financial Services Guide

Identity OS maps directly to regulatory and operational patterns in financial services. This guide shows how to use existing API features to solve common compliance and risk management challenges.

No custom modules required — everything here uses the standard API.


Use Case 1: Regulatory Tiered Triggers

Problem: Regulated entities have multi-level trigger frameworks — Early Warning → Recovery → Exit — each with different required actions. AI agents involved in monitoring or reporting must respect these boundaries.

How Identity OS solves it:

The 4-level Stress Model maps directly to regulatory trigger tiers:

Regulatory Level Identity OS Stress Agent Behavior
Normal operations LOW Full action set, standard reporting
Early Warning MED Conservative actions, escalation alerts enabled
Recovery HIGH Restricted to recovery actions only, senior approval required
Exit / Critical OVER Minimal actions, hard locks active, manual override only

Implementation:

from identity_os_sdk import IdentityOS, Mode

client = IdentityOS(api_key="idos_sk_xxx")
instance = client.instances.create(name="CapitalMonitor")

# Normal monitoring cycle — low stress signal
result = client.engine.process(
    instance_id=instance.id,
    mode_target=Mode.PERCEPTION,
    signal_strength=0.3
)
# contract.allowed_actions includes full reporting set

# Capital ratio approaching threshold — escalate stress
result = client.engine.process(
    instance_id=instance.id,
    mode_target=Mode.STRESS_RESPONSE,
    signal_strength=0.7  # MED territory
)
# contract now restricts to conservative actions

# Threshold breached — high stress
result = client.engine.process(
    instance_id=instance.id,
    mode_target=Mode.STRESS_RESPONSE,
    signal_strength=0.95  # HIGH/OVER territory
)
# contract.allowed_actions severely restricted
# contract.hard_locks active — agent can only execute pre-approved actions

What the contract enforces at each level:

  • LOW: Generate reports, send internal updates, run standard checks
  • MED: Generate reports + flag for review, restrict external communications
  • HIGH: Only generate recovery plan drafts, require human approval for any action
  • OVER: Freeze all autonomous actions, surface to management immediately

Use Case 2: Three Lines of Defence Personas

Problem: AI agents serving different organizational roles (business, risk/compliance, audit) must behave differently — an agent helping Internal Audit must not exhibit business-advocacy behavior.

How Identity OS solves it:

Use Persona presets to enforce role-appropriate behavior:

# 1st Line: Business Operations — efficiency-focused
result = client.engine.process(
    instance_id=ops_agent.id,
    mode_target=Mode.ASSERTION,  # Action-oriented
    signal_strength=0.7
)
# contract.decision_style.tempo = "decisive"
# contract.decision_style.risk = "moderate"
# Allowed: execute, suggest, elaborate

# 2nd Line: Risk & Compliance — challenge-focused
result = client.engine.process(
    instance_id=compliance_agent.id,
    mode_target=Mode.IDENTITY,  # Values-focused
    signal_strength=0.8
)
# contract.decision_style.tempo = "measured"
# contract.decision_style.risk = "conservative"
# Allowed: question, challenge, clarify

# 3rd Line: Internal Audit — independence-focused
result = client.engine.process(
    instance_id=audit_agent.id,
    mode_target=Mode.PERCEPTION,  # Observation-focused
    signal_strength=0.9
)
# contract.decision_style.tempo = "deliberate"
# contract.decision_style.risk = "averse"
# Allowed: question, clarify, defer
# Forbidden: suggest, execute (preserves independence)

Drift detection catches role contamination:

If an Audit agent starts exhibiting business-advocacy patterns (suggesting solutions instead of observing), Identity OS detects this as behavioral drift — the agent is drifting from its Auditor identity toward an Operator identity.


Use Case 3: Incident Severity Response

Problem: When operational incidents occur, AI agents must automatically shift behavior based on severity — minor incidents need standard handling, major incidents need crisis-mode responses with regulatory notification timelines.

How Identity OS solves it:

# Minor incident detected — slight stress increase
result = client.engine.process(
    instance_id=incident_agent.id,
    mode_target=Mode.STRESS_RESPONSE,
    signal_strength=0.4  # LOW→MED
)
# Agent shifts to cautious mode, standard procedures

# Major incident confirmed — high stress
for _ in range(5):  # Sustained stress signals
    result = client.engine.process(
        instance_id=incident_agent.id,
        mode_target=Mode.STRESS_RESPONSE,
        signal_strength=0.95
    )
# contract.current_stress_level = "HIGH" or "OVER"
# contract.allowed_actions restricted to crisis responses
# contract.decision_style.risk = "averse"

# Incident resolved — gradual recovery
for _ in range(20):
    result = client.engine.process(
        instance_id=incident_agent.id,
        mode_target=Mode.EXPLORATION,
        signal_strength=0.1  # Calm signal
    )
# Agent gradually returns to normal operations

What changes in crisis mode:

Normal Mode Crisis Mode
Full action vocabulary Restricted to pre-approved responses
Standard reporting cadence Immediate escalation required
Agent can explore solutions Agent follows playbook only
Moderate risk tolerance Zero risk tolerance

Use Case 4: Audit Trail for Compliance

Problem: Every decision an AI agent makes must be traceable and explainable for regulatory review.

How Identity OS provides this:

Every call to /process produces three auditable artifacts:

  1. Snapshot — The complete behavioral state at that moment
  2. ExecutionContract — What was allowed/forbidden and why
  3. Drift event — Whether behavior changed and by how much
# Full audit trail for any instance
history = client.engine.get_history(instance_id, limit=1000)
drift_log = client.engine.get_drift(instance_id, limit=1000)

# Each entry includes timestamp, cycle number, and full state
for obs in history.data:
    print(f"Cycle {obs.cycle}: mode={obs.mode_target}, "
          f"strength={obs.signal_strength}")

for event in drift_log.data:
    print(f"Cycle {event.cycle}: drift={event.drift_level}, "
          f"magnitude={event.magnitude}")

What auditors can verify:

  • Agent stayed within behavioral bounds for the entire session
  • Stress escalation followed expected patterns
  • No unauthorized behavioral drift occurred
  • Every forbidden action was blocked with a documented reason

Monitoring System / Data Feed
Your Agent (LangGraph / CrewAI / OpenAI Agents SDK)
Identity OS API ← Stress signals from monitoring thresholds
ExecutionContract → Agent acts within regulatory bounds
Audit Log (snapshots + contracts + drift events)

Identity OS sits between your agent and its actions. It doesn't replace your compliance logic — it enforces behavioral boundaries so your agent can't accidentally violate them.


Getting Started

  1. Create an instance for each agent role
  2. Map your regulatory thresholds to stress signal_strength values
  3. Define which actions are appropriate at each stress level
  4. Monitor drift to catch behavioral anomalies early
  5. Use the audit trail for compliance reporting

Questions? Contact us at xiocasso@outlook.com.