Workflow Details

Security Review Workflow

The system does not use a fixed agent sequence. The workflow is dynamically selected based on task type, required skills, risk, tools, confidence score, and approval rules.

Workflow

Name
Security Review Workflow
Use case
Customer or internal team wants only a security assessment (controls, risks, exposure, compliance posture).
Lead agent
IT-Security Agent
Why selected
Task explicitly asks for a security assessment; commercial, legal and delivery agents are not relevant unless escalated.

Agents

Involved
Coordinator AgentIT-Security Agent
Optional
Legal Agent Engaged only if security finding implies a contractual / DPA change.
MD / Leadership Agent Engaged only if risk is High or policy exception is requested.
Excluded
Sales Agent No commercial opportunity or customer commitment in scope.
Finance Agent No pricing or commercial decision is required.
Product Agent No product fitment question.
Legal Agent No contract terms involved (engaged only on escalation).
Operations Agent No delivery scoping required.
HR Agent No HR data or employee concern.

Approvals & escalations

Approval agents
Human Security Reviewer / CISO
Escalation agents
MD / Leadership AgentHuman CISO
Tools required
Compliance framework RAGRisk scannerPolicy library RAG

Flow

Coordinator Agent
IT-Security Agent
Security Risk Summary
Human Security Reviewer / MD if needed

Agent inclusion reasons

  • IT-Security AgentTask mentions data privacy, access control or security posture.