Agent Permission Boundaries
Apply least-privilege principles to AI agents by explicitly defining and enforcing the tools, APIs, data sources, and actions each agent is authorized to access.
Objective
Limit the blast radius of agent errors or compromise by ensuring agents can only access what they need for their defined task.
Maturity Levels
Initial
Agents are granted broad permissions by default; no formal permission review exists.
Developing
Permission restrictions are applied informally to some agents but not consistently documented.
Defined
Every agent has a documented permission manifest; access is provisioned through a formal request and approval process.
Managed
Permissions are reviewed quarterly; unused permissions are revoked; access anomalies are alerted.
Optimizing
Permissions are dynamically scoped to active task context and automatically reduced after task completion.
Evidence Requirements
What an auditor or assessor would expect to see for this control.
- —Permission manifest for each deployed agent listing permitted resources and explicit denials, signed by CISO or designated approver
- —Access provisioning records showing formal request and approval before permissions were granted or expanded
- —Quarterly permission review records confirming unused permissions were identified and revoked
- —Permission use logs showing access events by agent identity over a sample period
- —Alert or investigation records for any permission exercised for the first time after an extended dormant period
Implementation Notes
Key steps
- Define a permission manifest for each agent: list every tool, API endpoint, file system path, and database it may access, and explicitly deny everything else.
- Apply task-scoped tokens where possible — an agent that only needs to read a calendar should not hold credentials that allow calendar writes.
- Implement permission review gates before deploying new agent capabilities; treat capability expansion like a code deployment.
- Log every permission use; alert on first-use of permissions that haven't been exercised in the prior 30 days.
Example Implementation
Enterprise deploying an AI agent for internal IT helpdesk automation
Agent Permission Manifest — IT Helpdesk Agent v1.2
Agent purpose: Answer employee IT questions and create/update helpdesk tickets
| Resource | Permission | Scope Restriction |
|---|---|---|
| ServiceNow tickets | Read, Create, Update | Employee's own tickets only; no bulk operations |
| IT knowledge base | Read | Public articles only |
| Active Directory | Read | Name and department lookup only |
| Send | Reply-only; no new external threads | |
| File system | None | Explicitly denied |
| HR systems | None | Explicitly denied |
| Finance/billing | None | Explicitly denied |
Token type: Short-lived OAuth (1-hour TTL), scoped per session Permission review cadence: Quarterly Unused permission alert: Any permission not exercised in 30 days triggers review for removal Last reviewed: 2026-03-01 · Approved by: CISO Office
Control Details
- Control ID
- AGT-001
- Domain
- Agentic AI
- Typical owner
- CISO / AI Engineering
- Implementation effort
- High effort
- Agent-relevant
- Yes
