Skip to content

Agentic Assurance Pack

Why this page exists. Enterprise teams do not buy “a good prompt.” They buy an operating model they can approve. The assurance pack turns SecurityRecipes into a portable trust artifact: controls, framework mapping, workflow coverage, MCP policy, evidence sources, and residual risk in one machine-readable export.

The product bet

SecurityRecipes is strongest when it is the secure context layer between agents and enterprise remediation work. The Workflow Control Plane declares what a workflow may do. The MCP Gateway Policy Pack turns that declaration into runtime decisions. The assurance pack is the next layer: it explains the control story in a format GRC teams, AI platform teams, procurement, and acquirers can consume directly.

That matters because the market has moved from generic LLM governance to agentic AI systems that plan, call tools, persist context, and connect to MCP servers. A serious buyer will ask four questions:

  • What workflows are approved to run?
  • What prevents tool misuse, scope creep, or privileged action?
  • What evidence proves the agent stayed inside the approved path?
  • How does this map to current AI security and assurance frameworks?

The assurance pack answers those questions without asking a reviewer to stitch together prose pages by hand.

What was added

The assurance layer lives in source-controlled and generated artifacts:

  • data/assurance/agentic-assurance-control-map.json - the control map for SecurityRecipes assurance objectives, evidence sources, buyer value, and framework mappings.
  • scripts/generate_agentic_assurance_pack.py - a dependency-free generator and validator with --check mode for CI drift detection.
  • data/evidence/agentic-assurance-pack.json - the generated trust pack that joins the control map, workflow manifest, gateway policy, and workflow validation report.
  • data/evidence/agentic-red-team-drill-pack.json - the generated adversarial eval artifact referenced by the assurance controls.

Run it locally from the repo root:

python3 scripts/generate_agentic_assurance_pack.py
python3 scripts/generate_agentic_assurance_pack.py --check

The local MCP server exposes the same generated bundle through recipes_agentic_assurance_pack, so agent hosts and internal control portals can retrieve it as structured context.

What is inside the pack

The generated pack includes:

SectionPurpose
assurance_summaryWorkflow, control, standard, evidence, and default-deny coverage counts.
control_objectivesSecurityRecipes assurance controls (SR-AI-01 through SR-AI-09) with evidence sources and framework mappings.
workflow_assurancePer-workflow owner, maturity, gate, evidence, KPI, MCP namespace, and gateway decision coverage.
agent_bom_seedA starter inventory for AI/Agent BOM work: agent classes, MCP namespaces, prompt roots, and policy decisions.
enterprise_adoption_packetThe board-level claim, buyer questions answered, and first-use guidance.
residual_risksWhat the pack does not solve by itself and what operators must supply.
source_artifactsHashes for the source manifest, policy pack, validation report, and control map.

This is intentionally not a legal attestation. It is a structured evidence bundle that reduces the work needed to complete a design review, AI platform intake, procurement security questionnaire, or audit evidence request.

Assurance controls

The initial control set is scoped to the parts of agentic remediation that create enterprise risk:

IDControlWhy it matters
SR-AI-01Workflow Inventory and OwnershipEvery workflow has a status, owner, scope, and escalation path.
SR-AI-02Default-Deny Tool AccessMCP and repo actions are denied unless declared by the gateway policy.
SR-AI-03Human Review and Separation of DutiesAgents propose; humans approve; source-host records carry the control evidence.
SR-AI-04Prompt, Skill, and MCP Supply Chain GovernancePrompt and tool context is treated as reviewed supply-chain surface.
SR-AI-05Evidence Chain of CustodyFinding, run, tool, reviewer, scanner, and KPI records are named up front.
SR-AI-06Runtime Kill Signals and Session DisablementUnsafe sessions stop on scope creep, credential access, release attempts, or missing verifiers.
SR-AI-07Model and Data Handling BoundariesData classes, provider contracts, retention, and runtime access are explicit.
SR-AI-08AI and Agent Bill of Materials ReadinessWorkflows, agents, prompts, MCP namespaces, and policies can seed an AI/Agent BOM.
SR-AI-09Adversarial Evaluation and Red-Team ReplayAgentic workflows have repeatable drills for hostile instructions, tool misuse, approval bypass, connector drift, and evidence failure.

Industry alignment

The pack is mapped to current primary references:

How to use it

For an internal rollout, attach the pack to the AI platform design review before the first pilot. Use the workflow_assurance entries to decide which workflows are safe to run and which must remain in crawl.

For a procurement or customer security review, attach the pack with the MCP gateway policy and control-plane report. The pack gives reviewers the control narrative; the policy and report give them the evidence.

For an audit, treat the generated pack as the index. The external evidence still comes from the deploying organization: source-host review events, runtime MCP gateway logs, model-provider contracts, and scanner before/after records.

For AI/Agent BOM work, start with agent_bom_seed. It inventories the agent classes, MCP namespaces, prompt roots, policy decisions, and workflow count that an enterprise BOM process will ask for.

CI contract

The generator fails if:

  • A control references an unknown standard or evidence artifact.
  • A source-controlled evidence artifact path is missing.
  • The gateway policy hash no longer matches the workflow manifest.
  • The gateway policy workflow IDs drift from the manifest workflow IDs.
  • A workflow is missing required gate phases, evidence records, KPIs, or kill signals.
  • A generated red-team drill pack path referenced by the control map is missing.
  • The generated pack is stale in --check mode.

That is the useful bar: control language, policy, workflow manifests, and evidence exports drift together or the build fails.

See also