Skip to content

OASF — OPEN AGENT SECURITY FRAMEWORK

15 controls for AI agent governance. Open standard. Version 1.0.

Identity & Access

01

Agent Authentication

Every agent must authenticate with a verifiable identity before executing any operation.

02

Credential Isolation

Credentials are stored in encrypted vaults and never exposed to agent runtime memory.

03

Session Binding

Sessions are cryptographically bound to the originating device using ECDSA P-256 keypairs.

04

Access Scoping

Agent permissions are scoped to the minimum required resources with explicit allow-lists.

Runtime Security

05

Container Hardening

Agent containers run with read-only filesystems, no-new-privileges, and seccomp profiles.

06

Network Policy

Outbound network access is restricted to explicitly allowed domains and ports.

07

File System Protection

Sensitive host paths are blocked and filesystem writes are confined to designated volumes.

08

Process Isolation

Each agent runs in an isolated process namespace with resource limits enforced.

Data Protection

09

Secret Encryption

All secrets are encrypted at rest and in transit using AES-256-GCM with per-tenant keys.

10

Audit Logging

Every agent action, API call, and data access is logged with tamper-evident integrity.

11

Data Minimization

Agents only receive the data they need; PII is tokenized before reaching agent context.

12

Output Filtering

Agent outputs are scanned for secrets, PII, and prompt injection before delivery.

Governance

13

Skill Verification

All marketplace skills undergo code review, dependency audit, and sandbox testing.

14

Policy Enforcement

Organization-wide policies are enforced at the gateway layer before agent execution.

15

Compliance Reporting

Automated compliance reports map controls to SOC 2, ISO 27001, and GDPR requirements.

ASSESS YOUR AGENTS

Run a free OASF compliance assessment on your AI agents and get a detailed scorecard.

Run Assessment