AEGIS System Principles

Architectural Enforcement & Governance of Intelligent Systems

Version: 0.2
Status: Informational
Part of: AEGIS Architecture
Author: Kenneth Tannenbaum
Last Updated: March 6, 2026


Purpose

These principles are normative architecture rules for AEGIS. They define what must remain true for the system to be secure, governable, and auditable.

P1: Bounded Capability

Rule:

Implementation check:

P2: Complete Mediation

Rule:

Implementation check:

P3: Default Deny

Rule:

Implementation check:

P4: Deterministic Governance

Rule:

Implementation check:

P5: Auditability

Rule:

Implementation check:

P6: Explicit Authority Boundaries

Rule:

Implementation check:

P7: Fail-Closed Safety

Rule:

Implementation check:

P8: Least Privilege by Construction

Rule:

Implementation check:

P9: Policy Integrity

Rule:

Implementation check:

P10: Human Accountability for Exceptions

Rule:

Implementation check:

Standards Alignment

These principles collectively implement the GOVERN and MANAGE functions of the NIST AI Risk Management Framework (AI RMF 1.0),5 the risk management, record-keeping, and quality management requirements of the EU Artificial Intelligence Act,6 and the operational control and monitoring obligations of ISO/IEC 42001:2023.7

Principle Compliance Review

Each release SHOULD include a principle compliance checklist proving:


References

Footnotes

  1. J. P. Anderson, “Computer Security Technology Planning Study,” Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Hanscom Field, Bedford, MA, Tech. Rep. ESD-TR-73-51, Vol. II, Oct. 1972. See REFERENCES.md.

  2. J. H. Saltzer and M. D. Schroeder, “The protection of information in computer systems,” Proc. IEEE, vol. 63, no. 9, pp. 1278–1308, Sep. 1975, doi: 10.1109/PROC.1975.9939. See REFERENCES.md. 2 3

  3. F. B. Schneider, “Enforceable Security Policies,” ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 1, pp. 30–50, Feb. 2000, doi: 10.1145/353323.353382. See REFERENCES.md. 2

  4. S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” National Institute of Standards and Technology, Gaithersburg, MD, NIST Special Publication 800-207, Aug. 2020, doi: 10.6028/NIST.SP.800-207. See REFERENCES.md.

  5. National Institute of Standards and Technology, “Artificial Intelligence Risk Management Framework (AI RMF 1.0),” NIST AI 100-1, U.S. Department of Commerce, Jan. 2023, doi: 10.6028/NIST.AI.100-1. See REFERENCES.md.

  6. European Parliament and Council of the European Union, “Regulation (EU) 2024/1689 laying down harmonised rules on artificial intelligence (Artificial Intelligence Act),” Official Journal of the European Union, 12 Jul. 2024. See REFERENCES.md.

  7. International Organization for Standardization and International Electrotechnical Commission, “Information technology — Artificial intelligence — Management system,” ISO/IEC 42001:2023(E), Geneva, Switzerland, Dec. 2023. See REFERENCES.md.