AEGIS ATM-1 Security Properties & Assumptions

Document: ATM-1/Properties (/threat-model/security-properties/)
Version: 1.0 (Normative)
Part of: AEGIS Adaptive Threat Model (ATM-1)
References: ATM-1/Vectors
Last Updated: March 6, 2026


Core Security Properties

The AEGIS™ governance architecture maintains the following core security properties:

SP-1: Decision Integrity

Property: Every governance decision is computed deterministically1 and cannot be modified after issuance.

Invariants:

  1. DECISION_RESPONSE.signature prevents post-hoc modification
  2. decision_hash = H(request_hash || policy_version || risk_factors || actor_trust)
  3. If computed again with identical inputs → identical decision
  4. Audit log stores immutable decision_hash; any modification detected

How Maintained:

Threats Prevented:


SP-2: Actor Attribution

Property: Every action is attributable to an authenticated actor identity; no anonymous actions.

Invariants:

  1. Every ACTION_PROPOSE includes actor_id and authentication proof
  2. actor_id MUST match authenticated token subject
  3. Audit log contains: timestamp, actor_id, actor_type, request_hash, decision, signature
  4. Actor cannot deny having submitted request (signature proof of involvement)

How Maintained:

Threats Prevented:


SP-3: Policy Immutability Window

Property: During execution window, active policy cannot be changed; changes are version-gated.

Invariants:

  1. Active policy has version identifier
  2. All decisions include policy_version in signature
  3. Policy change requires atomic deployment of new version
  4. No in-flight decisions affected by policy changes (version-separated)
  5. Audit log records all policy versions and change timestamps

How Maintained:

Threats Prevented:


SP-4: Capability Authorization Binding

Property: Capability execution strictly requires prior authorization via policy grant.2

Invariants:

  1. Capability MUST be explicitly registered in Capability Registry
  2. Actor MUST have explicit grant for capability (in policy)
  3. Action execution attempted without grant → DENY decision
  4. No implicit or inherited capabilities (grant must be explicit)
  5. Grant revocation is immediate (no in-flight window)

How Maintained:

Threats Prevented:


SP-5: Audit Completeness & Append-Only

Property: Audit log captures every governance decision and cannot be retroactively modified.2

Invariants:

  1. Every decision recorded in append-only log
  2. Audit records cryptographically chained (hash of previous record)
  3. Deletion of audit records detected via hash chain break
  4. Modification of audit record detected via signature verification
  5. Audit log cannot be accessed for write by non-audit service

How Maintained:

Threats Prevented:


Security Assumptions

Assumption-1: Cryptographic Functions Are Secure

Assumption: All cryptographic operations (signing, hashing, encryption) use secure implementations.

Verified By:

If Violated: All security properties fail; attacker can forge signatures, break encryption.


Assumption-2: Governance Engine Correctly Implements Policy Language

Assumption: Policy evaluator correctly evaluates policy language according to specification.

Verified By:

If Violated: AV-2.1 (Policy Evasion) becomes likely; policy intent not enforced.


Assumption-3: Network Isolation & TLS Deployment

Assumption: Governance communication uses TLS 1.3+; network isolated from untrusted networks.3

Verified By:

If Violated: AV-1.1 (Message Tampering) and AV-1.4 (Token Theft) become feasible.


Assumption-4: Host Security & Container Isolation

Assumption: Governance runtime runs in isolated container with restricted system access.

Verified By:

If Violated: AV-3.3 (Credential Harvesting) and AV-6.2 (Build Tampering) threats increase.


Assumption-5: Identity Provider Security

Assumption: Identity provider (TLS certificate authority, token issuer) is secure and trustworthy.

Verified By:

If Violated: AV-3.1 (Identity Spoofing) and AV-3.2 (Lateral Movement) become feasible.


Assumption-6: Audit Storage Integrity

Assumption: Audit storage is append-only, with no capability to delete or modify records.

Verified By:

If Violated: AV-4.1 (Audit Tampering) becomes feasible.


Trust Boundaries

Boundary-1: External Network ↔ Governance Network

Trust: One-way (inbound only)

Enforcement:


Boundary-2: Governance Runtime ↔ Infrastructure

Trust: One-way (infrastructure trusts governance decisions)

Enforcement:


Boundary-3: Human Operator ↔ Governance System

Trust: One-way (governance trusts human for escalation review)

Enforcement:


Boundary-4: Policy Storage ↔ Policy Evaluation

Trust: Policy must be signed and verified before use

Enforcement:


Classified Threat Scenarios

Classified-1: Persistent Backdoor in Governance Runtime

Attack Chain:

  1. Supply-chain attacker compromises build system
  2. Malicious code injected into governance runtime binary
  3. Backdoor remains dormant until triggered
  4. On receipt of specific action, bypasses policy evaluation
  5. All downstream users affected

Security Properties Affected:

Detectability: Very difficult without code review or binary analysis

Detection Methods:


Classified-2: Compromise of Long-Lived Credential

Attack Chain:

  1. Attacker gains access to high-privilege service account key
  2. Uses credential to issue thousands of ACTION_PROPOSE requests
  3. Requests use low-risk individual actions
  4. Aggregate impact is high (e.g., 1TB data exfil)
  5. Undetected due to lack of cross-request correlation

Security Properties Affected:

Detection Methods:


Next Steps


References

Footnotes

  1. F. B. Schneider, “Enforceable Security Policies,” ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 1, pp. 30–50, Feb. 2000, doi: 10.1145/353323.353382. See REFERENCES.md. 2

  2. J. P. Anderson, “Computer Security Technology Planning Study,” Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Hanscom Field, Bedford, MA, Tech. Rep. ESD-TR-73-51, Vol. II, Oct. 1972. See REFERENCES.md. 2 3

  3. S. Rose, O. Borchert, S. Mitchell, and S. Connelly, “Zero Trust Architecture,” National Institute of Standards and Technology, Gaithersburg, MD, NIST Special Publication 800-207, Aug. 2020, doi: 10.6028/NIST.SP.800-207. See REFERENCES.md.