Back to Infrastructure
infrastructureL3 SystematicAgent Runtime & Sandboxing

Network isolation: agent can't see production

Network isolation for agents means that the agent's execution environment has a constrained network configuration: it can reach the systems it needs for development work (GitHub, p

  • ·Isolated agent environments (devbox model) prevent agents from accessing other projects
  • ·Pre-warmed containers with codebase at HEAD and dependencies installed are available
  • ·Network isolation prevents agents from reaching production systems
  • ·Container warm pool size matches team's agent usage patterns
  • ·Network isolation rules are tested and audited quarterly

Evidence

  • ·Devbox configuration showing per-project isolation boundaries
  • ·Pre-warmed container pool metrics (pool size, warm hit rate, cold start rate)
  • ·Network policy configuration (Kubernetes NetworkPolicy, firewall rules) blocking production access

What It Is

Network isolation for agents means that the agent's execution environment has a constrained network configuration: it can reach the systems it needs for development work (GitHub, package registries, CI APIs, staging environments) but cannot reach production systems, internal infrastructure, or sensitive services that it has no business touching. The agent is blocked from production databases, production APIs, internal admin interfaces, and any other systems where an accidental or malicious connection would cause harm.

The technical implementation uses standard network controls: Docker network policies that restrict outbound traffic, Kubernetes NetworkPolicy resources that whitelist permitted destinations, firewall rules on the host network, or egress filtering via a proxy. The mechanism does not matter much at L3 - what matters is that the boundary exists and is enforced by infrastructure rather than by agent behavior. An agent that is simply told "do not connect to production" can still connect to production if it reasons incorrectly or is given a task that leads it there. An agent whose network access physically does not include production routes cannot connect regardless of what it is told.

The practical implementation for most teams starts with an allowlist of outbound destinations: the version control host, the package registry for the project's language, the CI API, and specific staging environment endpoints. Everything else is denied by default. This allowlist is tighter than what developers need in their full environment, but it is appropriate for an agent that has a specific, bounded task.

Network isolation is particularly important because it is the control that prevents the worst class of agent accidents: an agent that is refactoring a service accidentally makes an API call to a production endpoint, causing a live transaction or data mutation. These accidents are not hypothetical - they happen when agents work in environments where production endpoints are reachable and the agent's context includes production credentials or URLs.

Why It Matters

  • Prevents accidental production mutations - an agent refactoring code that contains production API calls cannot accidentally trigger those calls if the network policy blocks the production endpoints
  • Contains the blast radius of credential mistakes - if an agent somehow gets hold of a production credential, network isolation prevents it from using that credential to reach production systems
  • Enables agents to work safely with real endpoint URLs in code - developers can let agents read and modify code that contains production API URLs without risk, because the agent's network cannot reach those URLs even if it tries
  • Simplifies compliance - demonstrating that agents cannot access production systems is a clear, auditable control that satisfies the "AI systems must not have access to production data" requirements in most compliance frameworks
  • Creates a clear boundary for code review - when an agent's network is isolated, code reviewers can focus on code quality rather than worrying about whether the agent might have accidentally touched production during its task

Getting Started

6 steps to get from here to the next level

Common Pitfalls

Mistakes teams actually make at this stage - and how to avoid them

How Different Roles See It

B
BobHead of Engineering

Bob's team recently had a near-miss: a developer was using an agent to refactor an API client and the agent, while testing code, made a real API call to a production webhook endpoint. No data was corrupted, but the unexpected API call triggered a monitoring alert and caused a 30-minute investigation. Bob wants to prevent this class of incident but does not know where to start.

What Bob should do - role-specific action plan

S
SarahProductivity Lead

Sarah has been worried about a pattern she is seeing: developers are overly conservative about which tasks they give to agents because they are concerned about accidental API calls or database writes. This conservatism limits agent use to "safe" tasks (code generation, documentation) and excludes tasks that touch external services. Network isolation would make it safe to use agents for a wider range of tasks.

What Sarah should do - role-specific action plan

V
VictorStaff Engineer - AI Champion

Victor has been implementing network isolation in his local agent setup using Docker network policies. He has a working configuration that allows outbound connections to GitHub, the npm registry, and the team's staging environment, while blocking everything else. He tested it by running an agent on a payment service codebase and verifying that the agent could not reach the production payment gateway even when it tried to run integration tests.

What Victor should do - role-specific action plan