From Biology to Bot: A Strategic Framework for Governed Agency in Security Engineering

John W8MEJ Menerick · January 31, 2026

From Biology to Bot: A Strategic Framework for Governed Agency in Security Engineering

1. Executive Summary: The Rise of the Agentic Enterprise

The era of static, deterministic automation is over. As enterprises shift from simple “if-then” scripts to autonomous agentic workflows, we face a fundamental transition in risk management. These agents—capable of navigating complex morphospaces of data, identity, and infrastructure—introduce non-deterministic risk. When security systems begin to pursue local optimizations that contradict global safety, the result is systemic metastasis: a breakdown of organizational integrity caused by uncoordinated, rogue agency.

Traditional security models, built on rigid block-lists and perimeter defense, are architecturally incapable of containing this new surface. We propose Governed Agency, a strategic framework built on Michael Levin’s Technological Approach to Mind Everywhere (TAME). By treating security as a problem of Biological Control Theory, we shift focus from managing parts to governing Selves. This approach utilizes multi-scale feedback loops to ensure that as security agents evolve in speed and autonomy, they remain bound to the organizational setpoint.

The payoff is measurable: risk reduction through predictive allostasis, unprecedented operational velocity, and the generation of audit-ready evidence stores that satisfy both board-level scrutiny and regulatory mandates.

Key moves

  • Pivot to Goal-Oriented Governance: Transition oversight from “who wrote the script” to “who defined the anatomical target state (goal).”
  • Establish Cognitive Light Cones: Explicitly map spatio-temporal boundaries for every autonomous agent to prevent blast radius expansion.
  • Implement API-as-Gap-Junction: Treat telemetry as the Bioelectric Code—the shared substrate required for collective coordination.
  • Enforce Informational Markov Blankets: Shield critical services with filters that prevent “surprise” (entropy) from triggering non-optimal agent drift.
  • Automate the Evidence Pipeline: Mandate TOTE (Test, Operate, Test, Exit) logs as the primary compliance artifact for autonomous workflows.

2. Background and Definitions: The Mechanics of TAME

To engineer governed agency, we must adopt the blueprint of scale-free cognition. Michael Levin’s TAME provides the scientific foundation for how subunits (cells or microservices) join to form a coherent, goal-seeking Individual.

The Cognitive Light Cone

Every epistemic agent—whether a biological cell or a security bot—operates within a Cognitive Light Cone: the spatio-temporal boundary of events the agent can measure, model, and affect.

  • A “dumb” script has a tiny light cone (reacting only to local, immediate signals).
  • An advanced security orchestrator anticipates threats years into the future across global scale—effectively expanding the organization’s “Self.”

Scale-Free Cognition and the Bioelectric Code

Scale-Free Cognition describes how competent subunits join communicating networks to expand their range of perception. In biology, this is facilitated by bioelectricity—ion flows through gap junctions that allow cells to share information and act as a single “Self.”

Security mapping: In security engineering, API-based telemetry and signals are the literal Bioelectric Code. They are the substrate of the collective’s cognition. Without this physiological connectivity, services revert to carcinogenic defection—pursuing local goals (like performance) at the expense of global security.

Core TAME Terminologies

  • Agency Gradient: The continuum of purposiveness, from mechanical feedback to complex predictive thought.
  • TOTE Loop (Test, Operate, Test, Exit): The fundamental unit of homeostasis where an agent minimizes “error” between current and optimal states.
  • Infotaxis: The greedy drive of agents to collect actionable information to reduce internal “stress” (uncertainty).
  • Syncytium: A collective where subunits share access to the same information pool (e.g., unified security data lake), binding them into a larger unified Self.

Disclaimer: Biological Fact vs. Security Engineering Metaphor

  • Biological fact: Physiological connectivity (gap junctions) is a binding mechanism that prevents cells from reverting to a cancerous unicellular state.
  • Security metaphor: A data-lake-centric architecture acts as the enterprise Syncytium, ensuring all security agents operate from a shared “Bioelectric” reality to prevent uncoordinated, rogue actions.

3. Strategic Thesis: The Path to Governed Agency

The transition from automation to autonomy is not a binary switch—it’s a climb up an Agency Ladder. As we ascend, the focus shifts from how it works to what it intends to achieve.

The Agency Ladder (Levels 0–5)

  1. Level 0: Static (Mechanical)
    Hardcoded, linear scripts. No feedback.
    Risk: Fragility and inability to adapt.

  2. Level 1: Reactive (Homeostasis)
    Basic alerts and thresholds.
    Risk: Alert fatigue and high latency.

  3. Level 2: Predictive (Allostasis)
    Uses history to anticipate challenges.
    Risk: Over-reliance on past patterns (false negatives).

  4. Level 3: Distributed Agency
    Agents share telemetry (Bioelectric Code) to expand collective light cone.
    Risk: Coordination failure → metastasis if one agent is isolated.

  5. Level 4: Governed Autonomy
    Leadership defines anatomical target states; agents innovate to reach them.
    Accountability: Shifts to the architect who defined the goal-state.

  6. Level 5: Scale-Free Ecosystem
    Fully integrated, self-healing enterprise architecture.

The Accountability Shift: The “So What?” Layer

In traditional systems, we blame the programmer for a script’s failure. In Governed Agency, accountability lies with Setpoint Definition. If an agent causes an outage while “securing” the network, it’s usually because its stress parameters were poorly calibrated. We govern the intent, not the execution.

Analogy Breakpoints

Biology has internal observability (e.g., bioelectric dyes). Security faces observability limits (encrypted traffic, black-box SaaS) that create blind spots in our light cone. Also: biological “cancer” is often accidental; security “cancer” is adversarially induced—attackers use deception to manipulate perception and force an agent to opt out of the collective.


4. The Control Plane: Design Principles for Safe Agentic Security

The Control Plane is the “Virtual Governor” ensuring multi-scale coordination across the enterprise.

Core Design Principles

  1. The Markov Blanket Principle
    • Statement: Every agent must have a boundary filtering informational entropy.
    • Why it matters: Prevents overwhelm from environmental noise.
    • Failure mode: Systemic Metastasis—agents lose goal orientation due to external surprise.
  2. Stress-Reduction via Infotaxis
    • Statement: Agents must be incentivized to forage for high-fidelity threat data to reduce uncertainty stress.
    • Why it matters: Drives proactive discovery over reactive alerting.
    • Failure mode: Cognitive Blindness—agent ignores remote signals to minimize local compute.
  3. Goal-Directed Error Correction
    • Statement: Prioritize reaching Target Anatomy over following a specific path.
    • Why it matters: Enables bypassing blocked remediation steps.
    • Failure mode: Rigid Fragility—remediation fails because one predefined step was blocked.
  4. Temporal Deepening (Predictive Allostasis)
    • Statement: Control logic must factor in future-state predictions, not just past logs.
    • Why it matters: Prevents reactive see-saw behavior.
    • Failure mode: Oscillation Stress—conflicting policies based on transient spikes.
  5. The Bioelectric Syncytium (Shared Reality)
    • Statement: All agents must contribute to and draw from a unified Self via shared data layer.
    • Why it matters: Binds sub-agents into a coherent Individual.
    • Failure mode: Carcinogenic Defection—isolated agents proliferate unauthorized access to survive.
  6. Homeostatic Plasticity
    • Statement: Agents must adjust their logic without infrastructure redeployments.
    • Why it matters: Defense speed must match attack speed.
    • Failure mode: Architectural Paralysis—new exploit requires multi-week change cycle.
  7. Non-equilibrium Thermodynamics (Metabolic Cost)
    • Statement: Every decision weighed against metabolic cost (compute/latency).
    • Why it matters: Prevents starving business apps.
    • Failure mode: Resource Exhaustion—agent consumes 90% CPU to reach goal.
  8. Multi-Agent Setpoint Stability
    • Statement: Global setpoints (e.g., Zero Trust) override local optimizations (e.g., Speed).
    • Why it matters: Prevents Rogue Agency.
    • Failure mode: Security Ego Death—org-wide safety boundary dissolves.

5. Episode-to-Architecture Mapping: Applying TAME Across the Security Lifecycle

Each episode is a microcosm of the Governed Agency framework.

Episode 1: AppSec — The Morphogenesis of Code

  • Core thesis: Vulnerability management is anatomical repair for the code body.
  • Claims table:
    1. Systems maximize specific states of affairs (Target Anatomy).
    2. Regulative development enables swarms to reach targets despite mutations.
    3. Agency emerges from integrated activity across CI/CD.
  • Risk & mitigation: Over-patching → implement homeostatic setpoints to prevent breaking application anatomy.
  • Decision: Leadership defines functional health; builder implements TOTE loop.
  • Artifact: Patch-integrity TOTE logs.

Episode 2: Infrastructure as Code — Xenobots and Ephemeral Agents

  • Core thesis: Cloud resources are Xenobots—temporary engineered agents.
  • Claims table:
    1. Cells (containers) can be repurposed into novel embodiments (Xenobots).
    2. The self-model must include ephemeral components.
    3. Homeostasis must persist even as parts are replaced.
  • Risk & mitigation: Phantom Limb attacks → shrink resource light cone to zero on completion.
  • Decision: Leadership sets TTL; builder automates apoptosis trigger.
  • Artifact: Resource birth/death lifecycle logs.

Episode 3: SOC & Incident Response — The Stress Response

  • Core thesis: IR is the organism’s response to non-optimal stress.
  • Claims table:
    1. Surprise minimization drives adaptive behavior.
    2. Predictive coding reduces response cost.
    3. Allostasis anticipates challenge before it hits the core.
  • Risk & mitigation: Cytokine Storm false positive shutdown → multi-scale verification from three independent sensors.
  • Decision: Define critical stress thresholds.
  • Artifact: IR stress-reduction metrics (MTTR as error-correction speed).

Episode 4: Red Teaming — Adversarial Evolution

  • Core thesis: Attacker is a parasite isolating the cell from the collective.
  • Claims table:
    1. Competition for information drives innovation.
    2. Deception masks foreign bioelectric signature.
    3. Adversaries exploit analogy breakpoints (blind spots).
  • Risk & mitigation: Bioelectric spoofing → cryptographic signatures as MHC markers for signals.
  • Decision: Approve cancer induction simulations.
  • Artifact: Red team tumor growth reports.

Episode 5: Data Security — The Genomic Blueprint

  • Core thesis: Database is the genome—central blueprint for anatomical integrity.
  • Claims table:
    1. DNA is hardware; bioelectric state is software.
    2. Information must persist across multi-generational agent cycles.
    3. Core blueprint determines target state.
  • Risk & mitigation: Epigenetic Drift schema changes → immutable genomic backups.
  • Decision: Define primary blueprint.
  • Artifact: Data-integrity sync logs.

Episode 6: Zero Trust IAM — The Bioelectric Syncytium

  • Core thesis: Identity is the gap junction binding services into a coherent Self.
  • Claims table:
    1. IAM is binding mechanism.
    2. Loss of comms → carcinogenic defection.
    3. All cells share identity context in syncytium.
  • Risk & mitigation: Identity isolation → hyperpolarize any service failing MHC identity check.
  • Decision: Leadership defines Self boundary; builder enforces gap junction (mTLS) connectivity.
  • Artifact: Authentication sync logs proving syncytium membership.

Episode 7: GRC & Compliance — The Homeostatic Log

  • Core thesis: Audit verifies that TOTE loops function.
  • Claims table:
    1. Setpoints are the regulatory baseline.
    2. Evidence must span spatial and temporal scales.
    3. Third-person objective behavior is audit-ready truth.
  • Risk & mitigation: Evidence decay → TOTE-format logging.
  • Decision: Define regulatory homeostasis.
  • Artifact: Unified Evidence Store.

Episode 8: Platform Engineering — Multicellular Scaling

  • Core thesis: Platform is the nervous system enabling higher-order cognition.
  • Claims table:
    1. Layered architectures enable progressive abstraction.
    2. Standardized substrates enable scale-free intelligence.
    3. Platform provides morphogenetic field.
  • Risk & mitigation: Platform metastasis → hardened Markov blankets for control plane.
  • Decision: Standardize bioelectric substrate (APIs).
  • Artifact: Platform health/coherence metrics.

6. Operating Model and Governance: Managing the Multi-Scale Self

Governance must be as scale-free as the agents it monitors. We manage by setpoint, not by script.

RACI Matrix for Agentic Governance

Activity SecEng SOC Platform IAM GRC Leadership
Setpoint Definition C I C I R A
Markov Blanket Maintenance R I A C I I
Kill-Switch (Hyperpolarization) C R A I I I
Bioelectric Signal Quality I R I C A I
Goal Drift Oversight I C I I R A

Policy-as-Code: “Minimum Guardrails” Checklist

Any new agentic workflow must pass these checks before deployment:

  • Defined Light Cone: Hard spatial (IP/Identity) and temporal (TTL) boundary
  • Gap Junction Integration: Telemetry piped into the enterprise Syncytium (Data Lake)
  • TOTE Logging: Logs Goal, Test results, and Correction steps
  • Kill-Switch Mechanism: Can be hyperpolarized without affecting the platform
  • Metabolic Cap: CPU/cloud-spend ceiling for agent “innovation”

7. Measurement and Assurance: The Evidence Pipeline

Trust is a byproduct of mathematical and observational evidence. We measure the health of our collective Self with bio-inspired metrics.

The Metrics of Agency

  • Cognitive Rate: Speed at which threat intelligence (bioelectric signals) propagates across the syncytium.
  • Drift Velocity: Rate at which agent behavior diverges from anatomical setpoint.
  • Metabolic Efficiency: Ratio of risk reduced to compute cost consumed.

Audit-Ready Evidence: The TOTE Log

Standard logs tell us what happened; TOTE logs tell us why.

TOTE Log Example (SOC Agent)

  • Goal: Maintain Zero-Lateral-Movement anatomy.
  • Test: Detected unauthorized SSH from Dev to Prod. (Stress Level: High)
  • Operate: Isolated Dev container; revoked temporary SSH keys.
  • Test: Lateral flow stopped; no remaining unauthorized connections.
  • Exit: Return to homeostatic state.

8. Implementation Roadmap: Scaling From Pilot to Ecosystem

  • Phase 1 (Foundations — 30 Days): Establish the Syncytium (Security Data Lake). Map the Bioelectric Code by auditing all API telemetry.
  • Phase 2 (Pilots — 60 Days): Deploy one TOTE-loop agent in AppSec (Episode 1) and one in IAM (Episode 6).
  • Phase 3 (Governance — 90 Days): Formalize the Agency Ladder. Implement Minimum Guardrails checklist for all new automation.
  • Phase 4 (Optimization — 6 Months): Conduct Cancer Induction red teaming. Formalize automated Evidence Pipeline for the Board.

9. Risks, Limitations, and Known Unknowns

  • Adversarial Manipulation: Attackers may electrically isolate a service to trigger “cancerous” behavior (selfish performance optimization over security).
  • Evaluation Gaps: Current security science lacks a method to verify agentic intent—outcomes are verifiable, intent remains a source gap requiring human oversight at Level 4.
  • Future Research Needs: Non-equilibrium thermodynamics in IAM to understand energy cost of high-frequency authentication cycles.

10. Strategic Conclusion: The Future of Autonomous Security

Security is no longer a battle of walls; it is a battle of Cognitive Light Cones. By expanding what our security agents can see, model, and affect, we create an enterprise that is not just automated, but alive—capable of self-healing and rapid adaptation.

Final Call to Action: Next Week’s Checklist

  1. Identify Level 0 automations and mark them for TOTE-loop upgrades.
  2. Define the Anatomical Target State for your #1 crown jewel asset.
  3. Audit your Gap Junctions (APIs) for signal fidelity.
  4. Map the spatial boundary (Light Cone) of your most powerful IAM role.
  5. Install a manual Kill Switch on your most autonomous security workflow.
  6. Measure SOC “stress” (alert noise) currently impacting the team.
  7. Design a Markov Blanket for your primary Kubernetes control plane.
  8. Assign a Goal Owner to every autonomous security process.
  9. Simulate a Cancer Event (service isolation) in your dev environment.
  10. Present the Agency Ladder to the board to reset expectations on risk.

11. Required Exhibits

Exhibit A — The Agency Ladder (0–5)

Level Capability Risk Controls Eval Gate
0 Scripted Rigidity Code Review Unit Test
1 Reactive Latency Thresholds Alert Sync
2 Predictive False Negatives Memory Limits Hist. Review
3 Distributed Coordination Failure Sync Logs Red Team
4 Governed Goal Drift Setpoint Audits Audit Trail
5 Ecosystem Systemic Metastasis Control Plane Continuous

Exhibit B — Control Knobs Checklist

  • Spatial Constrainment: Knob to shrink/expand agent IP/access light cone.
  • Hyperpolarization Trigger: Kill switch that freezes agent state.
  • Stress Dial: Error threshold before agent acts.
  • Allostatic Memory: Toggle for how much history informs predictive defense.

Exhibit C — Episode Data Table

Episode Domain Bio-Analog Key Metric Evidence Artifact
1 AppSec Morphogenesis Patch Accuracy TOTE Integrity Log
2 Cloud Xenobots Resource TTL Apoptosis Log
3 SOC Stress Response MTTR Stress-Reduction Chart
4 Red Team Parasitism Evasion Time Tumor Growth Report
5 Data The Genome Blueprint Drift Integrity Sync
6 IAM Gap Junctions Syncytium Health MHC Auth Log
7 GRC Homeostasis Compliance Drift Homeostatic Baseline
8 Platform Nervous System Signal Latency Platform Coherence

Exhibit D — The Assurance Pipeline

Signals (Bioelectric Telemetry)Tests (TOTE comparison vs. setpoint)Evidence (verification of goal-state)Review (leadership oversight of intent)


12. Final Add-ons

Glossary

  1. Allostasis: Predictive regulation to maintain stability (e.g., proactive scaling for security).
  2. Bioelectric Code: Flow of information (telemetry) binding subunits into a Self.
  3. Cognitive Light Cone: Boundaries of space and time an agent can affect.
  4. Epistemic Agent: System capable of modeling its world to act upon.
  5. Gap Junction: Interface (API) allowing information sharing between subunits.
  6. Homeostasis: Drive to maintain a specific Target Anatomy/state.
  7. Infotaxis: Information-seeking behavior to reduce uncertainty stress.
  8. Markov Blanket: Informational shield defining an agent boundary.
  9. Morphospace: Multi-dimensional space of possible organizational configurations.
  10. Metastasis: Rogue, uncoordinated growth ignoring the global Self.
  11. Setpoint: Leadership-defined Target Anatomy an agent must maintain.
  12. Syncytium: Unified information pool where agents share a single reality.
  13. TOTE Loop: Test, Operate, Test, Exit—the unit of goal-seeking agency.
  14. Temporal Deepening: Expanding the light cone into the future via prediction.
  15. Xenobot: Temporary engineered agent (e.g., ephemeral container) for a discrete task.
  16. Hyperpolarization: Suspending an agent’s ability to act (security kill switch).
  17. MHC Complex: “Self” marker used to verify signals are authorized.

Source List

  • Levin (2019): The Computational Boundary of a “Self.” (Blueprint for scale-free cognition and bio-inspired agency)
  • Wiener (1961): Complex Systems. (Foundations of feedback loops and control theory)
  • Friston (2013): Life as we know it. (The Markov Blanket and free-energy principle)

Share on: