🌐
Operational Environment (Agencies)
NIST AI RMFOWASP KC6AISVS C5NIST 800-53
Capabilities that allow agents to interact with external systems and environments, posing varying levels of risk. (NIST: Manage; OWASP: KC6; AISVS: C5)
Subcomponents
Security Implications
Operational environments can be abused for privilege escalation, code injection, or data exfiltration. Apply least privilege and runtime controls.
Implementation Considerations
Enforce least privilege, runtime controls, and continuous monitoring. Reference: OWASP KC6, AISVS C5.
Related Components
NIST 800-53 Rev 5 Controls
🗂️ Framework References