Home Cross-Cutting Security & Risk
SECTION VII

Security and Risk Management

Security is a continuous, cross-cutting discipline that spans all lifecycle phases. These controls address identity management, threat modeling, incident response, and supply chain security for AI agents.

Cross-Cutting Discipline
12 Control Objectives
Defense in Depth

Control Objectives

SEC-01

Identity and Access Management

Implement comprehensive identity and access management for both agents and users interacting with agents.

Primary Risk Addressed

Unauthorized agent or user access

Key Metric

Access control compliance rate

SEC-02

Network Segmentation

Implement network segmentation to prevent lateral movement from compromised agents and contain security incidents.

Primary Risk Addressed

Lateral movement from compromised agents

Key Metric

Segmentation policy compliance

SEC-03

Input Validation Coverage

Ensure comprehensive input validation for all agent inputs to prevent injection and manipulation attacks.

Primary Risk Addressed

Injection and manipulation attacks

Key Metric

% agents with input validation

SEC-04

Output Sanitization

Sanitize all agent outputs to prevent data leakage and ensure sensitive information is properly redacted.

Primary Risk Addressed

Data leakage through responses

Key Metric

Output violation incidents

SEC-05

Threat Model Currency

Maintain current threat models for all agents, regularly updating to reflect new attack vectors and vulnerabilities.

Primary Risk Addressed

Unidentified attack vectors

Key Metric

Threat model review recency

SEC-06

Adversarial Testing Coverage

Conduct regular adversarial testing (red team exercises) for high-tier agents to discover vulnerabilities before attackers.

Primary Risk Addressed

Undiscovered vulnerabilities

Key Metric

% Tier 3+ agents with red team exercise

SEC-07

Supply Chain Security

Verify the provenance and integrity of all models, components, and dependencies used by agents.

Primary Risk Addressed

Compromised models or components

Key Metric

Verified provenance percentage

SEC-08

Vendor Security Assessment

Conduct and maintain current security assessments for all third-party vendors providing agent components or services.

Primary Risk Addressed

Third-party security gaps

Key Metric

% vendors with current assessment

SEC-09

Concentration Risk Management

Monitor and manage concentration risk from over-dependence on single providers for models, infrastructure, or services.

Primary Risk Addressed

Over-dependence on single providers

Key Metric

Concentration risk score

SEC-10

Incident Response Readiness

Maintain tested incident response procedures specific to AI agent security incidents, including breach response playbooks.

Primary Risk Addressed

Slow or ineffective breach response

Key Metric

Incident response drill success rate

SEC-11

Kill Switch Availability

Ensure all agents have tested kill switches that can immediately halt agent operations in case of compromise or malfunction.

Primary Risk Addressed

Inability to stop compromised agents

Key Metric

% agents with tested kill switch

SEC-12

Forensic Logging Adequacy

Maintain comprehensive forensic logging enabling investigation and attribution of security incidents involving agents.

Primary Risk Addressed

Inability to investigate incidents

Key Metric

Log completeness score

Quick Reference

ID Objective Primary Risk Addressed Key Metric
SEC-01Identity and Access ManagementUnauthorized agent or user accessAccess control compliance rate
SEC-02Network SegmentationLateral movement from compromised agentsSegmentation policy compliance
SEC-03Input Validation CoverageInjection and manipulation attacks% agents with input validation
SEC-04Output SanitizationData leakage through responsesOutput violation incidents
SEC-05Threat Model CurrencyUnidentified attack vectorsThreat model review recency
SEC-06Adversarial Testing CoverageUndiscovered vulnerabilities% Tier 3+ agents with red team exercise
SEC-07Supply Chain SecurityCompromised models or componentsVerified provenance percentage
SEC-08Vendor Security AssessmentThird-party security gaps% vendors with current assessment
SEC-09Concentration Risk ManagementOver-dependence on single providersConcentration risk score
SEC-10Incident Response ReadinessSlow or ineffective breach responseIncident response drill success rate
SEC-11Kill Switch AvailabilityInability to stop compromised agents% agents with tested kill switch
SEC-12Forensic Logging AdequacyInability to investigate incidentsLog completeness score