Patterns
๐Ÿ‘ค

Privilege Compromise Mitigation Pattern(PCM)

Prevents privilege escalation and unauthorized operations through strict access control

Complexity: highSecurity & Privacy Patterns

๐ŸŽฏ 30-Second Overview

Pattern: Prevents privilege escalation through RBAC, identity separation, and dynamic de-escalation

Why: Agent privilege inheritance enables lateral movement; strict boundaries prevent compromise

Key Insight: Separate identity + least privilege + time limits + zero trust = secure operations

โšก Quick Implementation

1Separate Identity:Agent identity โ‰  user identity
2Apply RBAC:Role-based permissions, not user-based
3Least Privilege:Minimal permissions for each operation
4Dynamic De-escalation:Reduce privileges based on context
5Zero Trust:Verify every action, trust nothing
Example: identity_separation โ†’ role_assignment โ†’ permission_check โ†’ context_evaluation โ†’ access_decision

๐Ÿ“‹ Do's & Don'ts

โœ…Implement strict identity separation between agents and users
โœ…Use time-based privilege expiration and renewal
โœ…Apply context-aware permission boundaries
โœ…Monitor privilege usage patterns for anomalies
โœ…Require multi-factor approval for high-value operations
โŒLet agents inherit full user privileges automatically
โŒGrant permanent elevated permissions
โŒSkip privilege checks for "trusted" operations
โŒAllow privilege accumulation over time
โŒIgnore unusual privilege escalation patterns

๐Ÿšฆ When to Use

Use When

  • โ€ข Enterprise AI deployments
  • โ€ข Multi-user platforms
  • โ€ข Sensitive data access
  • โ€ข Compliance-regulated systems

Avoid When

  • โ€ข Single-user local systems
  • โ€ข Read-only applications
  • โ€ข Isolated environments
  • โ€ข Non-privileged operations only

๐Ÿ“Š Key Metrics

Escalation Attempts
Unauthorized privilege requests/day
Privilege Lifetime
Average minutes before de-escalation
Approval Rate
% high-risk operations approved
Identity Violations
Agent impersonation attempts
Compliance Score
% operations within policy
Audit Trail
Complete privilege history coverage

๐Ÿ’ก Top Use Cases

Financial Systems: Prevent unauthorized trades, transfers, or account access
Healthcare AI: Ensure PHI access follows minimum necessary principle
Enterprise Automation: Control system administration without full admin rights
Government AI: Maintain clearance levels and need-to-know restrictions
Cloud Platforms: Prevent lateral movement and resource abuse in multi-tenant systems

References & Further Reading

Deepen your understanding with these curated resources

Contribute to this collection

Know a great resource? Submit a pull request to add it.

Contribute

Patterns

closed

Loading...

Built by Kortexya