OASF — OPEN AGENT SECURITY FRAMEWORK
15 controls for AI agent governance. Open standard. Version 1.0.
Identity & Access
Agent Authentication
Every agent must authenticate with a verifiable identity before executing any operation.
Credential Isolation
Credentials are stored in encrypted vaults and never exposed to agent runtime memory.
Session Binding
Sessions are cryptographically bound to the originating device using ECDSA P-256 keypairs.
Access Scoping
Agent permissions are scoped to the minimum required resources with explicit allow-lists.
Runtime Security
Container Hardening
Agent containers run with read-only filesystems, no-new-privileges, and seccomp profiles.
Network Policy
Outbound network access is restricted to explicitly allowed domains and ports.
File System Protection
Sensitive host paths are blocked and filesystem writes are confined to designated volumes.
Process Isolation
Each agent runs in an isolated process namespace with resource limits enforced.
Data Protection
Secret Encryption
All secrets are encrypted at rest and in transit using AES-256-GCM with per-tenant keys.
Audit Logging
Every agent action, API call, and data access is logged with tamper-evident integrity.
Data Minimization
Agents only receive the data they need; PII is tokenized before reaching agent context.
Output Filtering
Agent outputs are scanned for secrets, PII, and prompt injection before delivery.
Governance
Skill Verification
All marketplace skills undergo code review, dependency audit, and sandbox testing.
Policy Enforcement
Organization-wide policies are enforced at the gateway layer before agent execution.
Compliance Reporting
Automated compliance reports map controls to SOC 2, ISO 27001, and GDPR requirements.
ASSESS YOUR AGENTS
Run a free OASF compliance assessment on your AI agents and get a detailed scorecard.
Run Assessment