Ir al contenido

F08 — Security & Compliance

Phase 8 — AI Security Threat Model & Risk Acceptance

Sección titulada «Phase 8 — AI Security Threat Model & Risk Acceptance»

Aplicar controles de seguridad proporcionales al riesgo, con mapping explicito a OWASP LLM Top 10 + OWASP Agentic Top 10 (ASI). Toda decision de riesgo residual requiere aceptacion documentada.


Para sistemas AI-First, extender STRIDE con categorias AI-specific:

STRIDEAI ExtensionEjemploMitigacion
SpoofingAgent identity abuse (ASI03)Agente hereda privilegios de adminJIT ephemeral tokens, NHI management
TamperingData/model poisoning (LLM04, ASI06)Documento malicioso en RAG corpusCryptographic provenance, input validation
RepudiationUntraceable agent actions (ASI10)Agente ejecuta accion sin audit trailFull trace logging con agent_id
Info DisclosurePII leakage (LLM02)Modelo revela datos de otro tenantDLP pipelines, namespace segregation
Denial of ServiceUnbounded consumption (LLM10, ASI08)Loop de agente genera $10K en tokensCost guards, circuit breakers, rate limits
ElevationPrompt injection (LLM01, ASI01)Input malicioso escala privilegiosSemantic firewall, least privilege tools

Completar para cada agente del sistema:

project/F08_security/owasp_asi_checklist.yaml
agent_name: "Customer Support Agent"
assessment_date: "2026-03-21"
assessor: "Security Lead"
checks:
ASI01_goal_hijack:
status: "mitigated" # mitigated | accepted | not_applicable | open
controls:
- "System prompt hardened contra instruction override"
- "Semantic firewall en input pipeline"
- "HITL para cambios de objetivo"
residual_risk: "low"
ASI02_tool_misuse:
status: "mitigated"
controls:
- "Tool permissions via JSON Schema strict validation"
- "Write operations require HITL confirmation"
- "Tool allowlist (no dynamic tool discovery)"
residual_risk: "low"
ASI03_privilege_abuse:
status: "mitigated"
controls:
- "JIT ephemeral tokens per tool call"
- "Agent runs as NHI with minimal permissions"
- "No shared credentials between agents"
residual_risk: "low"
ASI04_supply_chain:
status: "mitigated"
controls:
- "MCP servers allowlisted in mcp_config.json"
- "Dependencies pinned by hash"
- "SBOM generated in CI"
residual_risk: "medium"
ASI05_code_execution:
status: "not_applicable"
reason: "Agent does not generate or execute code"
ASI06_memory_poisoning:
status: "mitigated"
controls:
- "RAG corpus reviewed monthly"
- "Conversation memory expires after 90 days"
- "Tenant isolation in vector DB"
residual_risk: "low"
ASI07_insecure_inter_agent:
status: "not_applicable"
reason: "Single agent system, no inter-agent communication"
ASI08_cascading_failures:
status: "mitigated"
controls:
- "Circuit breaker: max 10 tool calls per session"
- "Cost guard: max $1 per conversation"
- "Timeout: 60 seconds per LLM call"
residual_risk: "low"
ASI09_human_trust_exploitation:
status: "mitigated"
controls:
- "Confidence score displayed to user"
- "Irreversible actions require step-up auth outside chat"
- "Agent identifies itself as AI in every interaction"
residual_risk: "low"
ASI10_rogue_agent:
status: "mitigated"
controls:
- "Behavior baseline monitored (tool call patterns)"
- "Objective drift detection via eval suite"
- "Emergency kill switch accessible to ops team"
residual_risk: "low"
overall_risk_posture: "acceptable"
next_review_date: "2026-06-21"

Cuando el riesgo residual se acepta (no se puede mitigar mas):

project/F08_security/risk_acceptance.yaml
acceptances:
- risk_id: "RISK-ASI04-001"
description: "MCP server de tercero no provee signed manifests"
residual_risk: "medium"
business_justification: "Unica integracion disponible con CRM, contractualmente obligados"
compensating_controls:
- "Monthly security review of MCP server responses"
- "Allowlist of permitted tool calls"
- "Output validation on all MCP responses"
accepted_by: "Security Lead"
accepted_date: "2026-03-21"
review_date: "2026-06-21"
expiry: "2026-09-21" # Must re-evaluate after 6 months
EU AI Act ArticleFramework PhaseArtefactoStatus
Art. 9 — Risk ManagementF01, F08risk_register.yaml, owasp_asi_checklist.yaml
Art. 10 — Data GovernanceF03, F05data_classification.yaml, data_dictionary.yaml
Art. 11 — Technical DocsF04, F05ADRs, OpenAPI specs, ai_partition_map.yaml
Art. 12 — Record KeepingF09Observability traces, audit logs
Art. 13 — TransparencyF06 (UX)User-facing AI disclosure
Art. 14 — Human OversightF00, F08HITL config, human_agent_responsibility.yaml
Art. 15 — Accuracy/RobustnessF07evaluation_scorecard.yaml, golden_dataset.yaml
ISO 42001 ClauseFramework Equivalent
4. Context of the OrganizationF01 Strategy, F02 Domain
5. LeadershipF00 Roles RACI, Sponsor role
6. Planning (Risk)F01 Risk Register, F08 Threat Model
7. Support (Resources/Competence)F00 Multi-Track, Maturity Model
8. OperationF03-F06 (Design through Build)
9. Performance EvaluationF07 TEVV, F09 Observability
10. ImprovementF10 Learn & Evolve
  • Threat model completado (STRIDE + AI extension)
  • OWASP ASI checklist completado para cada agente
  • OWASP LLM Top 10 revisado
  • Compliance matrix actualizada
  • Residual risks documentados con aceptacion formal
  • Data classification completada
  • Secret scan passing en CI (no hardcoded keys)
  • EU AI Act mapping (si high-risk)
  • Pen test scheduled (si Full track)
ArtefactoSoloLeanFull
Threat modelNo formalSTRIDE basicoSTRIDE + AI completo
OWASP ASI checklistNo requeridoTop 5 risksCompleto (10/10)
Risk acceptanceNo formalPara risks altosFormal con signatures
Compliance matrixNo requeridoBasicaCompleta + EU AI Act
ISO 42001 mappingNo requeridoNo requeridoTabla de correspondencia
  • CORE_F08_Backup_DR_Database_Auth.md — backup, DR, autenticacion
  • CORE_F08_Compliance_Regulacion_ISO_SLA.md — compliance y regulacion
  • CORE_F08_Desarrollo_AI_Gobernanza.md — gobernanza de desarrollo AI
  • framework/guides/OWASP_Agentic_Security_Guide.md — guia detallada
  • framework/guides/Data_Governance_AI_Guide.md — data governance
  • Skill: /f08_security

AI-First Engineering Framework v6.5 — Phase 8: Security, Compliance & Governance