v1.0
L2 StandardForward-looking
7.3 Trust Boundary Enforcement
7. Agent-to-Agent Security — How do agents trust each other?
Description
Agents MUST enforce trust boundaries when communicating with other agents.
Rationale
Even authenticated agents should not be fully trusted. Trust boundaries limit damage.
Audit Procedure
1. Document trust relationships 2. Check for scope validation 3. Test for scope bypass
Remediation
1. Define explicit trust policies 2. Implement request validation 3. Log out-of-scope requests
Framework Mappings
CIS Control 6.8NIST PR.AC-4