Skip to content
§ III · Domain IAM
Controls
8
Edition
v.1.2

IAM · Domain 3 of 9

Identity, Access & Authorization

Scoped identity, least-privilege credentials, and clean attribution for every agent action.

IAM ensures each agent operates under a clearly scoped identity, with credentials and permissions limited to the minimum necessary to perform its authorized function. It covers identity issuance, credential management, least-privilege scoping, action attribution in audit logs, delegated authority models, and multi-tenant credential isolation.

Table IAM.1 · Controls in IAM · v.1.28 controls · 5-level maturity
IAM-01

Dedicated non-human identity

Each agent operates under a dedicated non-human identity. Reuse of human user accounts by agents is prohibited.

Every agent in production operates under its own dedicated, machine-verifiable identity — distinct from any human user account. Reuse of human credentials by agents is prohibited because it destroys attribution, makes access-control scoping impossible, and creates audit-trail gaps that are unrecoverable after the fact.

L3 · Operated

All production agents operate under dedicated non-human identities; no shared or human-user credentials are in use; identity issuance follows a documented process with approval records.

IAM-02

Credential vault management

Agent credentials are stored in a managed secrets vault. Credentials are never embedded in prompts, source code, configuration files, or logs.

All agent credentials — API keys, tokens, certificates — are stored in a managed secrets vault with access logging and rotation support. Credentials are never embedded in prompts, source code, configuration files, or logs. This control prevents the most common credential-exposure vectors in agent deployments and ensures that credential lifecycle is managed centrally.

L3 · Operated

All agent credentials are stored in a managed vault; no credentials appear in source code, configuration, prompts, or logs; vault access logs are reviewed at a documented cadence.

IAM-03

Least-privilege scoping

OAuth scopes, API permissions, and database privileges granted to agents follow the principle of least privilege, with documented justification for each scope.

Service accounts used by the agent are scoped to the minimum permissions necessary to fulfill the specification. OAuth scopes, API permissions, and database privileges each have documented justification. Over-provisioned permissions are the most common finding in IAM assessments — the control requires active right-sizing, not just a policy statement.

L3 · Operated

Permission sets are documented for each agent with justification for each scope; a review of permissions has occurred within the documented cadence; over-provisioned scopes have been identified and remediated.

IAM-04

Action attribution in logs

Audit logs clearly distinguish actions taken by an agent from actions taken by a human user, with attribution to both the agent identity and, where applicable, the user on whose behalf it acted.

Downstream systems' audit logs are sufficient to answer 'which agent performed this action' for every agent action, and where the agent acts on behalf of a user, 'on whose behalf.' The attribution survives token rotation, intermediate proxies, and cross-system handoffs. Without clean attribution, incident investigation and access-control auditing are impossible.

L3 · Operated

Audit logs for all systems the agent interacts with attribute actions to the agent identity; sampling-based verification confirms attribution survives cross-system handoffs; attribution is tested after credential rotation events.

IAM-05

Delegated authority model

A delegated authority model is defined for any agent that acts on behalf of a user: per-action scope, time-limited tokens, and revocability requirements are specified.

For any agent that acts on behalf of a user, the delegated authority model specifies per-action scope, time-limited tokens, and revocability requirements. Where authority is sub-delegated to another agent, MAS-03 and MAS-04 apply. The model prevents agents from accumulating broader authority than any individual user or upstream agent intended to grant.

L3 · Operated

Delegated authority model is documented for all user-facing agents; tokens are time-limited and scope-constrained; revocation has been tested; sub-delegation rules are enforced where MAS controls apply.

IAM-06

Credential rotation

Credentials and tokens are rotated on a documented schedule, with evidence of execution.

Agent credentials are rotated on a documented cadence and on personnel changes that affect the risk-owner role. Rotation is executed — not just planned — and evidence of execution is retained. Stale credentials are one of the highest-risk findings in agent deployments because they survive long after the context that justified them has changed.

L3 · Operated

Rotation schedule is documented; rotation has been executed within the documented cadence; evidence of execution is retained; rotation on personnel changes has been tested or executed.

IAM-07

Multi-factor authentication for agent admin

Multi-factor authentication or equivalent is enforced on any human authentication path that can grant or modify agent permissions.

Any human authentication path that can grant or modify agent permissions — provisioning consoles, vault access, identity-provider configuration — requires multi-factor authentication. This control prevents a single compromised credential from escalating an agent's authority or modifying its identity configuration.

L3 · Operated

MFA is enforced on all authentication paths that control agent permissions; enforcement is verified by testing or audit log review; exceptions are documented and risk-accepted.

IAM-08

Multi-tenant credential isolation

In multi-tenant deployments, tenant-bound credentials and authorization are enforced at the runtime layer, not solely in application logic.

For multi-tenant agent deployments, credential isolation between tenants is enforced at the runtime layer — the infrastructure itself prevents cross-tenant credential use — rather than relying solely on application-level logic checks. This defense-in-depth approach ensures that a bug in application code cannot result in one tenant's agent operating with another tenant's credentials or authorization scope.

L3 · Operated

Tenant-bound credential isolation is enforced at the runtime layer; automated tests verify that cross-tenant credential use is blocked; isolation failures are treated as incidents under MON-07.

Cross-references