AI Governance Institute logo
AI Governance Institute

Practical Governance for Enterprise AI

Agentic AI
AGT · Agentic AIAGT-001High effortAgent-relevant

Agent Permission Boundaries

Apply least-privilege principles to AI agents by explicitly defining and enforcing the tools, APIs, data sources, and actions each agent is authorized to access.

Objective

Limit the blast radius of agent errors or compromise by ensuring agents can only access what they need for their defined task.

Maturity Levels

1

Initial

Agents are granted broad permissions by default; no formal permission review exists.

2

Developing

Permission restrictions are applied informally to some agents but not consistently documented.

3

Defined

Every agent has a documented permission manifest; access is provisioned through a formal request and approval process.

4

Managed

Permissions are reviewed quarterly; unused permissions are revoked; access anomalies are alerted.

5

Optimizing

Permissions are dynamically scoped to active task context and automatically reduced after task completion.

Evidence Requirements

What an auditor or assessor would expect to see for this control.

  • Permission manifest for each deployed agent listing permitted resources and explicit denials, signed by CISO or designated approver
  • Access provisioning records showing formal request and approval before permissions were granted or expanded
  • Quarterly permission review records confirming unused permissions were identified and revoked
  • Permission use logs showing access events by agent identity over a sample period
  • Alert or investigation records for any permission exercised for the first time after an extended dormant period

Implementation Notes

Key steps

  • Define a permission manifest for each agent: list every tool, API endpoint, file system path, and database it may access, and explicitly deny everything else.
  • Apply task-scoped tokens where possible — an agent that only needs to read a calendar should not hold credentials that allow calendar writes.
  • Implement permission review gates before deploying new agent capabilities; treat capability expansion like a code deployment.
  • Log every permission use; alert on first-use of permissions that haven't been exercised in the prior 30 days.

Example Implementation

Enterprise deploying an AI agent for internal IT helpdesk automation

Agent Permission Manifest — IT Helpdesk Agent v1.2

Agent purpose: Answer employee IT questions and create/update helpdesk tickets

ResourcePermissionScope Restriction
ServiceNow ticketsRead, Create, UpdateEmployee's own tickets only; no bulk operations
IT knowledge baseReadPublic articles only
Active DirectoryReadName and department lookup only
EmailSendReply-only; no new external threads
File systemNoneExplicitly denied
HR systemsNoneExplicitly denied
Finance/billingNoneExplicitly denied

Token type: Short-lived OAuth (1-hour TTL), scoped per session Permission review cadence: Quarterly Unused permission alert: Any permission not exercised in 30 days triggers review for removal Last reviewed: 2026-03-01 · Approved by: CISO Office

Control Details

Control ID
AGT-001
Typical owner
CISO / AI Engineering
Implementation effort
High effort
Agent-relevant
Yes

Tags

least privilegeagent securitypermissionsaccess control