🎛️
Orchestration (Control Flow)
NIST AI RMFOWASP KC2AISVS C9NIST 800-53
Mechanisms that dictate agent behavior, information flow, and decision-making. (NIST: Governance, Map; OWASP: KC2; AISVS: C9)
Subcomponents
Security Implications
Orchestration can be attacked via intent breaking, identity spoofing, or communication poisoning. Use secure protocols and role validation.
Implementation Considerations
Implement secure communication, role validation, and monitoring. Reference: OWASP KC2, AISVS C9.
Related Components
NIST 800-53 Rev 5 Controls
🗂️ Framework References