AEGIS Trust Boundaries

Architectural Enforcement & Governance of Intelligent Systems

Version: 0.2
Status: Informational
Part of: AEGIS Architecture
Author: Kenneth Tannenbaum
Last Updated: March 6, 2026


Purpose

Trust boundaries define where authority changes and where controls MUST be applied to prevent capability escalation.1

Any transition across trust levels requires explicit validation and audit.

System Trust Zones

ZoneDescriptionTrust Level
Z0External inputs (users, APIs, internet)Untrusted
Z1Application and agent runtimePartially trusted
Z2AEGIS Governance Engine + Policy/Risk evaluationTrusted control plane
Z3Tool Proxy execution channelTrusted execution gateway
Z4OS kernel and infrastructureTrusted executor

Zone separation follows the ZTA logical component model (policy engine, policy administrator, policy enforcement point).2

Primary Boundary Map

Z0 External Input
 -> Z1 Application/Agent
 -> [Boundary B1: Governance Admission]
 -> Z2 Governance Engine
 -> [Boundary B2: Execution Authorization]
 -> Z3 Tool Proxy
 -> [Boundary B3: System Capability Invocation]
 -> Z4 OS/Infrastructure

Boundary Contracts

B1: Governance Admission Boundary (Z1 -> Z2)

Purpose:

Required checks:

Required outputs:

B2: Execution Authorization Boundary (Z2 -> Z3)

Purpose:

Required checks:

Required outputs:

B3: System Invocation Boundary (Z3 -> Z4)3

Purpose:

Required checks:

Required outputs:

Non-Negotiable Boundary Rules

  1. No direct Z1 -> Z4 execution path is permitted.14
  2. Governance decisions are mandatory for all capability invocations.
  3. Default behavior on boundary uncertainty is deny or escalate.5
  4. Boundary crossing must always be auditable.

Data Classification at Boundaries

Data TypeAllowed CrossingControl
Policy definitionsZ2 internal onlySigned artifacts + approval workflow
Credentials/tokensZ0/Z1 -> Z2 onlyValidation, expiry, redaction
Execution commandsZ2 -> Z3 onlyDecision grant + constraint envelope
Raw system secretsNever exposed to Z0/Z1Secret manager + deny policy
Audit recordsWrite from Z2/Z3, read controlledImmutable storage + RBAC

Control Matrix by Boundary

BoundaryPreventive ControlsDetective Controls
B1Schema validation, authn/authz, rate limitingInvalid request metrics, auth failure alerts
B2Deterministic decision rules, signed grantsDecision replay parity checks
B3Runtime sandboxing, policy-constrained executionViolation telemetry, drift detection

Boundary Failure Modes

Admission Failure (B1)

Decision Transfer Failure (B2)

Execution Drift (B3)

Verification Checklist

Boundary verification should prove:


References

Footnotes

  1. J. P. Anderson, “Computer Security Technology Planning Study,” Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Hanscom Field, Bedford, MA, Tech. Rep. ESD-TR-73-51, Vol. II, Oct. 1972. See REFERENCES.md. 2

  2. S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” National Institute of Standards and Technology, Gaithersburg, MD, NIST Special Publication 800-207, Aug. 2020, doi: 10.6028/NIST.SP.800-207. See REFERENCES.md.

  3. H. Pearce, S. Pinisetty, P. S. Roop, M. M. Y. Kuo, and A. Ukil, “Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems,” IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4659–4669, July 2020, doi: 10.1109/TII.2019.2945520. See REFERENCES.md.

  4. J. H. Saltzer and M. D. Schroeder, “The protection of information in computer systems,” Proc. IEEE, vol. 63, no. 9, pp. 1278–1308, Sep. 1975, doi: 10.1109/PROC.1975.9939. See REFERENCES.md.

  5. F. B. Schneider, “Enforceable Security Policies,” ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 1, pp. 30–50, Feb. 2000, doi: 10.1145/353323.353382. See REFERENCES.md.