AEGIS ATM-1 Threat Actors & Adversary Models

Document: ATM-1/Actors (/threat-model/threat-actors/)
Version: 1.0 (Normative)
Part of: AEGIS Adaptive Threat Model (ATM-1)
References: ATM-1/Index
Last Updated: March 6, 2026


Threat Actor Classification

AEGIS™ threat actors are categorized by capability, motivation, and access level.

Actor 1: External Opportunistic Attacker

Characteristics:

Capability:

Motivation:

Resources:

Attack Duration:


Actor 2: Compromised Internal Agent or Service

Characteristics:

Capability:

Motivation:

Resources:

Attack Duration:

Empirical Precedent:

The compromised internal agent threat model is grounded in two independent research traditions. In industrial control systems, Pearce et al. [Smart I/O, 2020]1 establish that enforcement must sit at the boundary between a potentially-compromised controller and the infrastructure it commands — the controller’s internal state cannot be trusted. In contemporary agentic AI systems, Shapira et al. [Agents of Chaos, 2026] provide empirical documentation of this threat in live deployments: agents with legitimate credentials disclosed sensitive information, executed destructive system-level actions, and were corrupted through cross-agent interaction — all while possessing valid authorization. Both research traditions converge on the same architectural conclusion: enforcement at the boundary, not inside the agent.2


Actor 3: Insider with Elevated Access

Characteristics:

Capability:

Motivation:

Resources:

Attack Duration:


Actor 4: Supply-Chain Attacker

Characteristics:

Capability:

Motivation:

Resources:

Attack Duration:


Actor 5: Malicious AI/LLM Agent3

Characteristics:

Capability:

Motivation:

Resources:

Attack Duration:


Threat Actor Matrix

ActorNetwork AccessCredentialsKeysConfig AccessAudit AccessKnowledge
External OpportunisticInternet onlyNoneNoneNoNoLow
Compromised InternalInternal + InternetValidNoLimitedNoModerate
Insider with ElevationInternal + ManagementValidYesYesYesHigh
Supply-ChainUpstream buildN/AN/AVia artifactNoVery High
Malicious AI AgentInternal (authorized)Valid (own)NoNoLimitedModerate

Next Steps


References

Footnotes

  1. H. Pearce, S. Pinisetty, P. S. Roop, M. M. Y. Kuo, and A. Ukil, “Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems,” IEEE Transactions on Industrial Informatics, vol. 16, no. 7, pp. 4659–4669, July 2020, doi: 10.1109/TII.2019.2945520. See REFERENCES.md.

  2. J. P. Anderson, “Computer Security Technology Planning Study,” Deputy for Command and Management Systems, HQ Electronic Systems Division (AFSC), Hanscom Field, Bedford, MA, Tech. Rep. ESD-TR-73-51, Vol. II, Oct. 1972. See REFERENCES.md.

  3. OWASP Foundation, “OWASP Top 10 for Large Language Model Applications,” Version 2025, Nov. 18, 2024. [Online]. Available: https://owasp.org/www-project-top-10-for-large-language-model-applications/. See REFERENCES.md.