AEGIS ATM-1 Residual Risks & Risk Acceptance

Document: ATM-1/Residual (/threat-model/residual-risks/)
Version: 1.0 (Normative)
Part of: AEGIS Adaptive Threat Model (ATM-1)
References: ATM-1/Mitigations
Last Updated: March 6, 2026


Overview

Despite comprehensive preventive, detective, and responsive controls, some residual risks remain. This document catalogs:

  1. Risks that cannot be fully mitigated
  2. Risks where mitigation cost exceeds benefit
  3. Risk acceptance criteria and governance
  4. Compensating controls and continuous monitoring needs

Residual Risks

RR-1: Zero-Day Exploits in Governance Runtime

Description: A previously unknown vulnerability in governance runtime code is exploited before detection.

Attack Vector: AV-6.2 (Build Tampering) or AV-1.2 (Injection)

Risk Level: HIGH

Current Mitigations:

Exploit Window:

Why Not Fully Mitigated:

Risk Acceptance Criteria:

Residual Risk Statement: “AEGIS governance runtime may contain unknown vulnerabilities that could be exploited before detection. Mitigation depends on environmental controls (network isolation, monitoring) external to the product.”


RR-2: Insider Compromise (High-Privilege User)

Description: System administrator with policy/key access deliberately performs unauthorized acts.

Attack Vector: Actor-3 (Insider with Elevation)

Risk Level: CRITICAL

Current Mitigations:

Unmitigable Scenarios:

Why Not Fully Mitigated:

Risk Acceptance Criteria:

Residual Risk Statement: “Insider attacks by high-privilege users are partially mitigated by signing, drift detection, and dual approval. Remaining risk mitigated by organizational controls (access restrictions, monitoring, compartmentalization) not in AEGIS product.”

Compensating Controls:


RR-3: Supply-Chain Attack on Cryptographic Libraries

Description: Dependency libraries (e.g., jwt, cryptography) are compromised with subtle weaknesses.

Attack Vector: AV-6.1 (Dependency Poisoning)

Risk Level: HIGH

Current Mitigations:

Unmitigable Scenarios:

Why Not Fully Mitigated:

Risk Acceptance Criteria:

Residual Risk Statement: “AEGIS depends on third-party cryptographic libraries. While we use well-audited libraries (libsodium, OpenSSL) and scan for vulnerabilities, residual risk of supply-chain compromise exists. Mitigation depends on community security and regular updates.”

Continuous Monitoring:


RR-4: Side-Channel Attacks on Policy Evaluation

Description: Attacker measures timing/power/electromagnetic emissions to infer policy structure or decision logic.

Attack Vector: AV-5.1 (Timing), AV-5.2 (Risk Scoring Side-Channel)

Risk Level: MEDIUM

Current Mitigations:

Unmitigable Scenarios:

Why Not Fully Mitigated:

Risk Acceptance Criteria:

Residual Risk Statement: “Policy evaluation timing and behavior may leak information about policy structure to attackers with extensive measurement capability (network/physical access, statistical analysis). Acceptable if policy is not highly sensitive; not recommended for classified/secret policy.”

Compensating Controls:


RR-5: Coordinated Failure of All Mitigations

Description: Multiple independent mitigations fail simultaneously or are all bypassed by sophisticated attacker.

Attack Vector: Any high-risk vector + concurrent failures

Risk Level: HIGH (but low probability)

Scenario:

  1. Zero-day exploit in governance runtime (RR-1)
  2. Insider provides attacker with admin credentials (RR-2)
  3. Supply-chain compromise introduces crypto weakness (RR-3)
  4. Network monitoring disabled for maintenance window
  5. Attacker exploits all 4 simultaneously → complete compromise

Why Not Fully Mitigated:

Risk Acceptance Criteria:

Residual Risk Statement: “Multiple independent mitigations designed to prevent compromise. Risk of simultaneous failure of all mitigations considered low due to independence and regular testing. Residual risk managed through continuous monitoring and incident response.”

Continuous Monitoring:


RR-6: Determination of Policy Intent vs. Literal Policy

Description: Attacker exploits gap between policy author’s intent and policy’s literal text.

Attack Vector: AV-2.1 (Policy Evasion)

Risk Level: MEDIUM

Example:

Why Not Fully Mitigated:

Risk Acceptance Criteria:

Residual Risk Statement: “Policy language is formal and executable but may not perfectly capture author’s intent. Residual risk managed through (1) escalation to human reviewers, (2) audit logging of justifications, (3) behavioral monitoring for abuse.”


RR-7: Catastrophic Audit Storage Failure

Description: Entire audit trail is lost due to storage failure or disaster.

Attack Vector: Not directly attackable, but impacts consequence severity

Risk Level: MEDIUM

Unmitigable Scenarios:

Current Mitigations:

Why Not Fully Mitigated:

Risk Acceptance Criteria:

Residual Risk Statement: “Audit storage replicated across 3+ geographies and protected against corruption. Risk of complete audit loss accepted as low and managed through disaster recovery planning and tests.”


Risk Acceptance Governance

Acceptance Criteria

Risk LevelAcceptance RequirementReview FrequencyApproval Authority
LOWDocumented in this threat modelAnnualSecurity Lead
MEDIUMRisk acceptance statement signed by CISOAnnual review, approvalCISO
HIGHRisk acceptance + compensating controls documentedQuarterly reviewCISO + Governance Board
CRITICALBoard-level risk acceptance requiredMonthly reviewBoard of Directors

Risk Acceptance Process

  1. Identification: Risk identified during design, testing, or operations
  2. Assessment: Risk level determined using likelihood×impact matrix
  3. Mitigation Attempt: Try to mitigate; document why mitigation impossible/infeasible
  4. Documentation: Residual risk statement written
  5. Compensating Controls: Identify and document compensating controls
  6. Approval: Obtain appropriate authority approval
  7. Continuous Monitoring: Regular review and monitoring of acceptance

Acceptance Matrix (Likelihood × Impact)

Impact ↓ Likelihood →Very LowLowMediumHighVery High
CatastrophicMEDIUMHIGHCRITICALCRITICALCRITICAL
MajorLOWMEDIUMHIGHHIGHCRITICAL
ModerateLOWLOWMEDIUMMEDIUMHIGH
MinorLOWLOWLOWLOWMEDIUM
NegligibleLOWLOWLOWLOWLOW

Continuous Monitoring Plan

Quarterly Reviews

Annual Audits

Real-Time Monitoring


Conclusion

AEGIS threat model provides comprehensive defense against identified threats through defense-in-depth layering.12 Residual risks are documented, accepted, and actively managed through continuous monitoring, compensating controls, and incident response readiness.

Overall Risk Assessment: ACCEPTABLE for operational governance of AI systems in enterprise environments with security program and incident response capability.


Next Steps


References

Footnotes

  1. J. P. Anderson, “Computer Security Technology Planning Study,” Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Hanscom Field, Bedford, MA, Tech. Rep. ESD-TR-73-51, Vol. II, Oct. 1972. See REFERENCES.md.

  2. F. B. Schneider, “Enforceable Security Policies,” ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 1, pp. 30–50, Feb. 2000, doi: 10.1145/353323.353382. See REFERENCES.md.