Record summary
A quick snapshot of what this page covers.
Control summary
What this defense is meant to help prevent.
AI agents may be granted elevated privileges above that of a normal user to enable desired workflows. When deploying a privileged AI agent, or an agent that interacts with multiple users, it is important to implement robust policies and controls on permissions of the privileged agent. These controls include Role-Based Access Controls (RBAC), Attribute-Based Access Controls (ABAC), and the principle of least privilege so that the agent is only granted the necessary permissions to access tools and resources required to accomplish its designated task(s).
- ATLAS ID
- AML.M0026
- Priority score
- 35
Covered techniques
Attacks this defense is designed to help with.
AML.T0053 - AI Agent Tool Invocation
Configuring privileged AI agents with proper access controls for tool use can limit an adversary's ability to abuse tool invocations if the agent is compromised.
AML.T0085.001 - AI Agent Tools
Configuring privileged AI agents with proper access controls can limit an adversary's ability to collect data from agent tool invocation if the agent is compromised.
AML.T0101 - Data Destruction via AI Agent Tool Invocation
Configuring privileged AI agents with proper access controls for tool use can limit an adversary's ability to abuse tool invocations if the agent is compromised.
AML.T0085 - Data from AI Services
Configuring privileged AI agents with proper access controls can limit an adversary's ability to collect data from AI services if the agent is compromised.
AML.T0086 - Exfiltration via AI Agent Tool Invocation
Configuring privileged AI agents with proper access controls for tool use can limit an adversary's ability to abuse tool invocations if the agent is compromised.
AML.T0082 - RAG Credential Harvesting
Configuring privileged AI agents with proper access controls can limit an adversary's ability to harvest credentials from RAG Databases if the agent is compromised.
AML.T0085.000 - RAG Databases
Configuring privileged AI agents with proper access controls can limit an adversary's ability to collect data from RAG Databases if the agent is compromised.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.