v1.0
L1 EssentialAutomated verification
2.2 Least Privilege Principle
2. Capability & Authorization — What can this agent do?
Description
Agents MUST operate with the minimum permissions necessary to perform their intended function.
Rationale
Overprivileged agents have larger blast radius when compromised.
Audit Procedure
1. List all permissions the agent has 2. Document which are actually used 3. Identify and flag unused permissions
Remediation
1. Audit current permissions and remove unused 2. Use read-only access where possible 3. Scope to specific resources
Framework Mappings
CIS Control 5.4CIS Control 6.1NIST PR.AC-4NIST PR.PT-3