Least Privilege
Agents run with minimal necessary permissions, reducing attack surface and potential damage from compromise.
Stavily agents are designed with a strong focus on security and isolation to protect customer infrastructure and data. The core principles guiding agent security include least privilege, tenant isolation, sandboxed execution, and secure communication.
Least Privilege
Agents run with minimal necessary permissions, reducing attack surface and potential damage from compromise.
Tenant Isolation
Strict separation of data and execution environments for different tenants prevents cross-tenant attacks.
Sandboxed Execution
All plugin code runs within isolated environments to prevent unauthorized access or malicious activity.
Secure Communication
All agent-orchestrator communication is encrypted and authenticated using industry-standard protocols.
Action Agents implement comprehensive security controls:
installation_token for API authenticationSensor Agents follow similar security patterns with additional monitoring-focused controls:
The Stavily platform employs a multi-modal authentication strategy, with agents specifically utilizing mTLS for primary authentication.
Mutual Transport Layer Security ensures both agent and orchestrator verify each other’s identity using client certificates.
authentication_methods: agents: primary: "mTLS with client certificates" secondary: "Basic auth for initial registration" certificate_rotation: "Automatic 90-day rotation"Basic Authentication used for initial registration before mTLS is established.
The orchestrator’s API security configuration includes specific settings for agent authentication:
security: agent_auth: require_tls: true validate_hostname: true max_failed_attempts: 5require_tls: All agent communication must use TLSvalidate_hostname: Certificate hostname verificationmax_failed_attempts: Brute-force protectionAll plugins executed by agents operate within secure sandbox environments to mitigate risks associated with untrusted code execution.
sandbox: memory_limit: 256MB cpu_limit: 0.5 network_access: restricted filesystem_access: - /tmp - /var/log/stavily allowed_syscalls: - read - write - open - close - stat blocked_syscalls: - exec - fork - socket - bindAgent communication with the orchestrator is secured using robust encryption protocols:
encryption_in_transit: agent_communication: protocol: "mTLS with client certificates" validation: "Certificate pinning and validation" fallback: "No fallback to unencrypted communication"Agents integrate with Stavily’s comprehensive security architecture:
graph TB
subgraph "Layer 1: Network Security"
FW[Firewall & WAF]
VPN[VPN Access]
NP[Network Policies]
end
subgraph "Layer 2: Infrastructure Security"
K8S[Kubernetes Security]
HSM[Hardware Security Modules]
SCAN[Container Scanning]
end
subgraph "Layer 3: Application Security"
AUTH[Authentication]
AUTHZ[Authorization]
VALID[Input Validation]
end
subgraph "Layer 4: Data Security"
REST[Encryption at Rest]
TRANSIT[Encryption in Transit]
KEY[Key Management]
end
FW --> K8S
K8S --> AUTH
AUTH --> REST
When deployed as containers, agents benefit from additional security layers:
Agents generate security-relevant events for monitoring:
detection_rules: authentication_anomalies: - "Multiple failed authentication attempts" - "Certificate validation failures" - "Unusual connection patterns"
sandbox_violations: - "Resource limit exceedances" - "Blocked system call attempts" - "Unauthorized filesystem access"
communication_anomalies: - "TLS handshake failures" - "Certificate expiry warnings" - "Connection timeout patterns"Agent security measures support GDPR compliance:
All agent security events are logged and auditable:
{ "timestamp": "2025-01-15T10:30:00Z", "level": "WARN", "component": "action-agent", "agent_id": "action-001", "event": "certificate_expiring", "details": { "days_remaining": 7, "certificate_id": "cert-123" }}Automated certificate lifecycle management:
Agent-specific incident response procedures: