The Five Core Elements

25 core requirements across five elements, with detailed implementation controls at every maturity level.

🔐

Identity

Who are you?

Establish and continuously verify the identity of AI agents, their authorization chains, and their operational context. In Zero Trust, identity is the new perimeter.

Core Requirements

The 5 normative requirements for this element, as published in the CSA specification.

RequirementDescription
Unique IdentifierGlobally unique, immutable identifier for each agent instance
Credential BindingAgent identity bound to cryptographic credentials
Ownership ChainClear documentation of ownership and operational responsibility
Purpose DeclarationDocumented intended use and operational scope
Capability ManifestMachine-readable list of claimed agent capabilities

Implementation Controls

Detailed controls that support the core requirements above, organized by maturity level.

Agent Registration

RequirementDescriptionLevel
Unique IdentifierGlobally unique, immutable identifier per agentAll
Credential BindingIdentity bound to cryptographic credentialsAll
Ownership ChainDocumented owner/operator for every agentAll
Purpose DeclarationDocumented intended use and scopeJunior+
Capability ManifestMachine-readable list of agent capabilitiesSenior+

Authentication

RequirementDescriptionLevel
Token-Based AuthJWT or equivalent for all API callsAll
Short-Lived TokensTokens expire within defined timeframesAll
Mutual TLSCertificate-based auth for sensitive operationsSenior+
Hardware-Bound IdentityTPM or HSM-backed credentialsPrincipal

Authorization

RequirementDescriptionLevel
Role-Based AccessAgents assigned roles with defined permissionsAll
Attribute-Based AccessDynamic authorization based on contextJunior+
Just-In-Time AccessElevated permissions granted temporarilySenior+
Policy-as-CodeAuthorization rules in auditable, testable formatPrincipal

Session Management

RequirementDescriptionLevel
Session TrackingAll sessions logged with timestampsAll
Session LimitsMaximum concurrent sessions enforcedAll
Session TerminationAbility to revoke sessions immediatelyAll
Session ContextEnvironment and purpose tracked per sessionJunior+

Implementation Patterns

Intern Level

Basic JWT authentication with role assignment. Focus on audit trail.

Junior Level

Add OAuth2/OIDC flows for human approval workflows. Session context enables approval routing.

Senior Level

Implement attribute-based policies. Just-in-time privilege elevation for specific actions.

Principal Level

Full policy-as-code with OPA. Hardware-backed identity for high-value operations.

👁️

Behavior

What are you doing?

Continuously monitor agent actions, detect anomalies, and ensure behavior aligns with declared intent. Trust is earned through observable, explainable actions.

Core Requirements

The 5 normative requirements for this element, as published in the CSA specification.

RequirementDescription
Structured LoggingAll agent actions logged in machine-parseable format
Action AttributionEvery action tied to agent identity and session context
Behavioral BaselineEstablished patterns of normal operation for anomaly detection
Anomaly DetectionIdentification of deviations from expected behavior
ExplainabilityAbility to retrieve rationale for agent decisions

Implementation Controls

Detailed controls that support the core requirements above, organized by maturity level.

Action Logging

RequirementDescriptionLevel
Structured LoggingAll logs in machine-parseable formatAll
Action AttributionEvery action tied to agent identity and sessionAll
Input/Output CaptureRequest and response payloads loggedAll
Reasoning CaptureAgent's stated rationale for decisionsJunior+

Behavioral Baseline

RequirementDescriptionLevel
Activity ProfilingTrack typical action patterns and frequenciesJunior+
Resource Usage BaselineNormal CPU, memory, network, API call patternsJunior+
Temporal PatternsExpected operating hours and activity rhythmsSenior+
Interaction PatternsTypical agent-to-agent and agent-to-system interactionsSenior+

Anomaly Detection

RequirementDescriptionLevel
Statistical Anomaly DetectionFlag actions outside normal distributionsJunior+
Sequence Anomaly DetectionIdentify unusual action sequencesSenior+
Intent Drift DetectionDetect changes in agent decision patternsSenior+
Real-Time ScoringContinuous anomaly score calculationPrincipal

Explainability

RequirementDescriptionLevel
Decision LoggingRecord factors influencing each decisionAll
Audit Query SupportRetrieve decision rationale on demandJunior+
Counterfactual Explanation"Why not X?" explanations availableSenior+
Real-Time ExplanationOn-demand explanation during operationPrincipal

Implementation Patterns

Intern Level

Comprehensive structured logging. Human review of all outputs.

Junior Level

Add behavioral baselines and anomaly flagging. Suspicious actions routed to human queue.

Senior Level

Real-time anomaly detection with automated alerting. Actions continue but humans notified.

Principal Level

Continuous behavioral scoring integrated with incident response. Automated escalation of edge cases.

📊

Data Governance

What are you eating? What are you serving?

Validate all data entering the agent, protect sensitive information, and govern output quality and appropriateness. Garbage in, garbage out applies doubly to AI.

Core Requirements

The 5 normative requirements for this element, as published in the CSA specification.

RequirementDescription
Schema ValidationInputs conform to expected structure and types
Injection PreventionDetection of prompt injection and adversarial inputs
PII/PHI ProtectionAutomated detection and masking of sensitive data
Output ValidationOutputs conform to expected structure and content policies
Data LineageTracking of data provenance through the agent pipeline

Implementation Controls

Detailed controls that support the core requirements above, organized by maturity level.

Input Validation

RequirementDescriptionLevel
Schema ValidationInputs conform to expected structureAll
Type CheckingData types verified before processingAll
Injection PreventionPrompt injection and adversarial input detectionJunior+
Source VerificationData provenance validatedSenior+

Sensitive Data Protection

RequirementDescriptionLevel
PII DetectionAutomated identification of personal dataAll
Data MaskingSensitive data redacted in logs and outputsAll
Encryption in TransitTLS for all data movementAll
Data ClassificationAutomated sensitivity classificationSenior+

Output Governance

RequirementDescriptionLevel
Output Schema ValidationOutputs conform to expected structureAll
Toxicity FilteringHarmful content detection and filteringAll
Hallucination DetectionFactual accuracy verification where possibleJunior+
Regulatory ComplianceOutputs meet industry-specific requirementsPrincipal

Data Lineage

RequirementDescriptionLevel
Input Source TrackingRecord where each input originatedJunior+
Transformation LoggingTrack how data was processedSenior+
Output AttributionOutputs traceable to input sourcesSenior+
Full Lineage GraphComplete data flow visualizationPrincipal

Implementation Patterns

Intern Level

Basic schema validation and PII detection. All outputs reviewed by humans.

Junior Level

Add prompt injection detection and output validation. Flagged items queued for approval.

Senior Level

Full data classification and lineage tracking. Automated remediation for common issues.

Principal Level

Custom NER models for domain-specific data. Full DLP integration. Real-time output governance.

🧱

Segmentation

Where can you go?

Enforce boundaries on agent access, limit blast radius, and ensure least-privilege operation. Agents should only access what they need, when they need it.

Core Requirements

The 5 normative requirements for this element, as published in the CSA specification.

RequirementDescription
Resource AllowlistExplicit enumeration of permitted resources
Action BoundariesExplicit enumeration of permitted actions
Rate LimitingMaximum operations per time period
Transaction LimitsMaximum impact per individual action
Blast Radius ContainmentLimits on cumulative impact and cascade effects

Implementation Controls

Detailed controls that support the core requirements above, organized by maturity level.

Resource Boundaries

RequirementDescriptionLevel
Resource AllowlistExplicit list of permitted resourcesAll
API Endpoint RestrictionsLimited to specific endpointsAll
Data Scope LimitsAccess to specific data subsets onlyAll
Network SegmentationAgents isolated at network levelSenior+

Action Boundaries

RequirementDescriptionLevel
Action AllowlistExplicit list of permitted actionsAll
Read vs. Write SeparationDistinct permissions for read/writeAll
Destructive Action LimitsSpecial controls for delete/modifyJunior+
Rate LimitingMaximum actions per time periodAll

Temporal Boundaries

RequirementDescriptionLevel
Operating HoursDefined windows for agent activityJunior+
Maintenance WindowsRestricted operation during sensitive periodsSenior+
Time-Based PermissionsPermissions that expire or activate on scheduleSenior+

Blast Radius Containment

RequirementDescriptionLevel
Scope LimitsMaximum scope of any single actionAll
Transaction LimitsMaximum value/impact per transactionJunior+
Cumulative LimitsMaximum impact over time periodsSenior+
Cascade PreventionLimits on triggering other agents/systemsPrincipal

Implementation Patterns

Intern Level

Strict allowlists for resources and read-only actions. No write access.

Junior Level

Add action allowlists with human approval for anything outside list.

Senior Level

Policy-as-code enforcement. Dynamic boundaries based on context.

Principal Level

Full microsegmentation with real-time policy evaluation.

🚨

Incident Response

What if you go rogue?

Detect, contain, and recover from agent failures, compromises, or unexpected behavior. Assume agents will fail and plan accordingly.

Core Requirements

The 5 normative requirements for this element, as published in the CSA specification.

RequirementDescription
Circuit BreakerAutomatic halt on repeated failures
Kill SwitchImmediate manual termination capability (<1 second)
Session RevocationAbility to invalidate all agent sessions
State RollbackAbility to undo agent actions where possible
Graceful DegradationFallback to lower autonomy level on issues

Implementation Controls

Detailed controls that support the core requirements above, organized by maturity level.

Detection

RequirementDescriptionLevel
Error DetectionAutomatic identification of failuresAll
Anomaly AlertsNotifications when behavior deviatesJunior+
Threshold AlertsNotifications when limits approachedJunior+
CorrelationLink related events across systemsSenior+

Containment

RequirementDescriptionLevel
Circuit BreakerAutomatic halt on repeated failuresAll
Kill SwitchImmediate manual termination capabilityAll
Session RevocationInvalidate all agent sessionsAll
IsolationQuarantine agent from other systemsSenior+

Recovery

RequirementDescriptionLevel
State RollbackAbility to undo agent actionsJunior+
Checkpoint/ResumeRestore from known good stateSenior+
Graceful DegradationFallback to lower autonomy levelSenior+
Automated RecoverySelf-healing within defined parametersPrincipal

Post-Incident

RequirementDescriptionLevel
Incident LoggingComplete record of incident timelineAll
Root Cause AnalysisSystematic investigation processJunior+
Remediation TrackingFollow-up actions documented and trackedSenior+
Lessons LearnedUpdates to policies and proceduresSenior+

Implementation Patterns

Intern Level

Circuit breakers and kill switches. All incidents trigger human review.

Junior Level

Add automated alerting and basic rollback. Incidents pause approval queue.

Senior Level

Full isolation and recovery capabilities. Graceful degradation to Junior level.

Principal Level

Automated detection, containment, and recovery within bounds. Escalation for novel incidents.

Cross-Element Integration

The five core elements don't operate in isolation. Effective ATF implementation requires deliberate integration.

IdentityBehavior

Session identity enables behavioral attribution; role context informs anomaly detection thresholds

BehaviorIncident Response

Anomaly scores trigger containment measures; behavioral logs feed root cause analysis

Data GovernanceSegmentation

Data classification drives access boundaries; input validation prevents boundary bypass attempts

SegmentationIdentity

Resource access requires identity verification; boundary violations trigger re-authentication

All Elements → Audit: Every element generates audit events. A unified audit trail enables compliance reporting.

Compliance Mapping

ATF requirements map directly to established compliance frameworks.

ATF RequirementSOC 2ISO 27001NIST AI RMFEU AI Act
Agent RegistrationCC6.1A.9.2.1GOVERN 1.1Art. 16
AuthenticationCC6.1A.9.4.2MAP 1.1Art. 15
Action LoggingCC7.2A.12.4.1MEASURE 2.1Art. 12
Data ProtectionCC6.5A.18.1.4MANAGE 2.1Art. 10
Output GovernanceCC6.5A.18.1.4MANAGE 2.2Art. 14
Access ControlCC6.3A.9.1.1MANAGE 1.1Art. 9
Incident ResponseCC7.4A.16.1.4MANAGE 4.1Art. 62