Controls/Capability & Authorization/2.3
L1 EssentialAutomated verification

2.3 Capability Boundaries

2. Capability & AuthorizationWhat can this agent do?

Description

Agent capabilities MUST be enforced at runtime, not just declared.

Rationale

Declaration without enforcement is security theater. Runtime enforcement blocks unauthorized actions.

Audit Procedure

1. Test if agent can exceed declared capabilities
2. Attempt unauthorized file access, network calls
3. Check for capability enforcement middleware

Remediation

1. Implement capability checking middleware
2. Use sandbox with enforced boundaries
3. Implement network egress filtering

Framework Mappings

CIS Control 6.7NIST PR.AC-4