Agentic AI security curriculum · Security overview
Advanced Zero Trust: Multi-Sig Vault, HSM, Tamper-Proof Logging, and Cryptographic Provenance
Module 6 of 20 · Agentic AI Security Curriculum · May 2026
How to use this module
Use it as self-paced study or as instructor-led training. YAML, commands, and policy excerpts are illustrative; map them to your cloud, mesh, identity provider, and agent runtime—substitute your own names, namespaces, and tools while preserving the control intent.
Estimated time: ~40 minutes reading; add time for linked standards and team discussion.
Learning objectives
By the end of this module, you should be able to:
- Compare static vs dynamic secrets and justify short TTLs for machine identities.
- Describe tamper-evident logging goals and cryptographic provenance at a high level.
- Relate signing and integrity checks to models and large binaries, not only container images.
Prerequisites
Suggested discussion / lab: Pick one diagram in your environment (build, deploy, runtime) and mark where this module’s controls apply; note gaps versus the checklist in the body.
Building on Zero Trust fundamentals (Module 5), this module covers the advanced cryptographic and secret-management controls that make trust assumptions explicit and verifiable across the entire platform.
Dynamic Secrets with Short TTL
Teams often use HashiCorp Vault for all secrets (database credentials, API keys, mTLS certificates, etc.).Key practices:Secrets are issued dynamically per workload with short TTLs (minutes to hours). Automatic revocation on pod termination. No long-lived static secrets anywhere in the cluster.
Vault Agent sidecars handle token renewal and secret injection. The Operator monitors lease counts and alerts on orphaned credentials.
JWT ATR Session Tokens
Every agent session receives a short-lived JWT containing ATR (Agent Task Request) claims. These claims define exactly what tools, verticals, and data the agent may access.Panguard and the intelligent MCP gateway validate the JWT signature and claims on every clawql_execute call. Agents cannot escalate their own privileges or forge claims.
Merkle Trees and Cryptographic Provenance
Every critical artifact carries tamper-evident provenance:Documents after Presidio redaction Memory 2.0 graph entities and edges Workflow definitions Proxy dispatches and tool call results
A Merkle root is computed and recorded for each operation. Roots are stored in WORM volumes and a Git-backed, Cosign-signed repository. Any silent modification is immediately detectable on read.
WORM Storage and Tamper-Proof Logging
All security-relevant logs (prompts, tool calls, decisions) are written to WORM (Write Once, Read Many) storage.Presidio redaction runs in the Fluent Bit pipeline before logs reach Loki. Merkle roots link logs to the broader audit trail. No deletions or modifications are possible after write.
This ensures forensic integrity even if an attacker reaches the logging infrastructure.
Cosign Blob Signing for Model Weights
Model weights (the largest unverified artifact in most AI stacks) are protected with:Signed manifests stored in Harbor Init-container verification before inference starts SHA-256 hash checking combined with Cosign verification
This closes the “model-in-the-middle” attack vector that container image scanning cannot detect.
Key Takeaways
Dynamic secrets with short TTLs and automatic revocation eliminate standing credentials. JWT ATR tokens enforce explicit, verifiable capabilities at the MCP layer. Merkle trees and WORM storage provide cryptographic proof that nothing has been silently altered. Every trust assumption — from model weights to audit logs — is made explicit and independently verifiable.
These advanced controls turn Zero Trust from a philosophy into enforceable, auditable reality across the platform.
Next module: RBAC, mTLS, and Istio Service Mesh – Network-Level Zero Trust.
Further reading (vendor-neutral)
These resources are independent of any single product; use them to deepen the topic for audits, architecture reviews, or procurement discussions.
Commercial training use
You may reuse this curriculum internally or in paid consulting / training engagements. Keep examples aligned to the customer’s actual stack; substitute your own runbooks, tool names, and compliance frameworks (SOC 2, ISO 27001, sector regulators) where cited examples use a reference architecture only.
