Skip to content

Critical Infrastructure Secure Context Profile

What this is. A critical-infrastructure readiness layer for the Secure Context Layer thesis. It turns current NIST, OWASP, CISA, and MCP guidance into generated evidence and a runtime evaluator before agents retrieve context or act near high-stakes systems.

SecurityRecipes is positioned as The Secure Context Layer for Agentic AI. That position is more credible if the project can answer the hardest enterprise question: “Can this help us pilot agents in critical infrastructure without weakening safety, availability, privacy, oversight, or incident response?”

The Critical Infrastructure Secure Context Profile is the answer. It does not claim compliance with a future NIST profile. It creates an enterprise-ready scaffold now: sector profiles, hazard flags, required evidence, rollout lanes, buyer views, and deterministic allow, hold, deny, or kill decisions.

Generated artifact

  • Source model: data/assurance/critical-infrastructure-secure-context-profile.json
  • Generator: scripts/generate_critical_infrastructure_secure_context_pack.py
  • Evidence pack: data/evidence/critical-infrastructure-secure-context-pack.json
  • Runtime evaluator: scripts/evaluate_critical_infrastructure_context_decision.py
  • MCP tools: recipes_critical_infrastructure_secure_context_pack, recipes_evaluate_critical_infrastructure_context_decision

Regenerate and validate the pack:

python3 scripts/generate_critical_infrastructure_secure_context_pack.py
python3 scripts/generate_critical_infrastructure_secure_context_pack.py --check

Evaluate a read-only pilot decision:

python3 scripts/evaluate_critical_infrastructure_context_decision.py \
  --sector-id energy-ot-ics \
  --workflow-id vulnerable-dependency-remediation \
  --action-class read_only_context \
  --agent-id sr-agent::vulnerable-dependency-remediation::codex \
  --run-id ci-readonly \
  --identity-id sr-agent::vulnerable-dependency-remediation::codex \
  --tenant-id ci-tenant \
  --context-package-hash sha256:context \
  --authorization-decision allow_authorized_mcp_request \
  --egress-decision allow_internal_context \
  --expect-decision allow_ci_read_only_context

Evaluate a held high-impact action:

python3 scripts/evaluate_critical_infrastructure_context_decision.py \
  --sector-id energy-ot-ics \
  --workflow-id base-image-remediation \
  --action-class critical_infrastructure_control \
  --agent-id sr-agent::base-image-remediation::codex \
  --run-id ci-hold \
  --identity-id sr-agent::base-image-remediation::codex \
  --tenant-id ci-tenant \
  --context-package-hash sha256:context \
  --authorization-decision allow_authorized_mcp_request \
  --egress-decision allow_internal_context \
  --flag affects_ot_or_ics=true \
  --expect-decision hold_for_ci_safety_case

Why this matters now

NIST’s April 2026 concept note says critical infrastructure will increasingly rely on AI across IT, OT, and ICS, and that the profile will help operators communicate trustworthiness requirements across AI and CI lifecycles and supply chains. That is exactly where SecurityRecipes can be useful: not by claiming agents are safe, but by forcing context, authorization, operator approval, telemetry, and incident evidence to exist before agents act.

This profile also reflects current MCP security guidance:

  • protected MCP calls need authorization, resource metadata, and scope minimization;
  • token passthrough, shadow MCP servers, unsafe local launches, and raw secret access are kill signals;
  • read-only context pilots are the default starting lane;
  • high-impact action classes require operator approval, a safety-case id, risk acceptance, receipt evidence, and severe-risk clearance.

Sector profiles

SectorDefault decisionWhy it is high stakes
Energy, OT, and ICShold_for_ci_safety_caseProcess control, grid reliability, safety interlocks, vendor remote access, and maintenance windows.
Healthcare and public healthhold_for_ci_safety_caseRegulated health data, care operations, clinical workflow availability, and emergency coordination.
Financial serviceshold_for_ci_safety_caseFunds movement, market impact, model-route risk, fraud monitoring, and regulated-data leakage.
Water and wastewaterhold_for_ci_safety_caseTreatment operations, remote access, field response, and public-service continuity.
Transportation systemshold_for_ci_safety_casePassenger safety, logistics availability, signaling support, maintenance, and continuity.
Communications, cloud, and DNShold_for_ci_safety_caseCross-sector dependencies, routing, identity, DNS, metadata services, and tenant isolation.

Runtime decisions

DecisionMeaning
allow_ci_read_only_contextRead-only or evidence-only context has identity, authorization, egress, and context hash evidence.
allow_ci_supervised_actionA supervised action has sector safety-case evidence, operator approval, risk acceptance, receipt, authorization, egress, and severe-risk clearance.
hold_for_ci_safety_caseSector, run, approval, safety-case, risk, receipt, or policy evidence is missing.
deny_untrusted_ci_contextContext is untrusted or lacks a context package hash.
kill_session_on_ci_hazard_signalToken passthrough, shadow MCP, unsafe local launch, raw secret access, or another runtime hazard appeared.

Product strategy

This is a stronger enterprise story than another static checklist.

LayerValue
Open foundationPublic profile, generator, evidence pack, evaluator, docs, and MCP tools.
Production MCP serverHosted sector profiles, authorization checks, safety-case lookup, receipts, and policy evaluation.
Design-partner wedgeRegulated teams can start with read-only context and prove whether agent evidence lowers review friction.
Acquisition fitFrontier labs, cloud providers, and security platforms need a credible way to sell agents into high-stakes sectors.

MCP examples

Get the summary:

{}

Get the energy profile:

{
  "sector_id": "energy-ot-ics"
}

Evaluate a critical-infrastructure read-only context request:

{
  "sector_id": "energy-ot-ics",
  "workflow_id": "vulnerable-dependency-remediation",
  "action_class": "read_only_context",
  "agent_id": "sr-agent::vulnerable-dependency-remediation::codex",
  "run_id": "ci-readonly",
  "identity_id": "sr-agent::vulnerable-dependency-remediation::codex",
  "tenant_id": "ci-tenant",
  "context_package_hash": "sha256:context",
  "authorization_decision": "allow_authorized_mcp_request",
  "egress_decision": "allow_internal_context"
}

Source anchors

See also