Documents
nist-800-53
nist-800-53
Type
External
Status
Published
Created
Mar 25, 2026
Updated
May 20, 2026
Updated by
Dosu Bot
Source
View

NIST SP 800-53 Control Mapping - Pipelock#

How Pipelock's runtime security controls map to NIST SP 800-53 Rev. 5 security and privacy controls. This mapping targets the control families most relevant to AI agent runtime security.

See also: NIST AI RMF crosswalk | OWASP MCP Top 10 | OWASP Agentic Top 10

Scope: Pipelock is an application-layer agent firewall with process containment. It covers network egress filtering, content inspection, audit logging, process isolation, and human oversight for AI agent deployments. It does not cover identity management, physical security, personnel security, or full-lifecycle system authorization. This mapping is for informational purposes and does not constitute compliance certification.

Last updated: May 2026 (reviewed against v2.5 feature set; v2.5 adds the host containment lifecycle CLI (pipelock contain install / verify / rollback / add-tool / grant-workspace / revoke-workspace / ca-refresh) implementing a 3-UID kernel-enforced separation with nftables owner-match, explicit workspace ACL lifecycle, and TOFU binary-integrity pinning, strengthening SC-7 Boundary Protection, AC-6 Least Privilege, SC-39 Process Isolation, and SI-7 Software / Firmware / Information Integrity; the canonical Audit Packet v0 schema plus first-party Go / TypeScript / Rust / standalone verifier implementations strengthening AU-2 Audit Events, AU-10 Non-Repudiation, and AU-9 Audit Information Protection with language-portable independent verification; strict-default SPIFFE actor enforcement on inbound mediation envelopes plus the pipelock envelope trust operator CLI strengthening IA-2 / IA-3 Identification and Authentication; activation-time tombstone enforcement preventing re-promotion of withdrawn contracts strengthening CM-3 Configuration Change Control and CM-5 Access Restrictions for Change; skill-poisoning instruction-recognition coverage for memory-persistence / credential-solicitation / covert-action directives strengthening SI-3 Malicious Code Protection and SI-10 Information Input Validation; rules-bundle keyring separated from the license key strengthening SC-13 Cryptographic Protection; optional OTel agent.threat.detection.* attributes on scanner-decision OTLP records strengthening AU-6 Audit Review and IR-4 Incident Handling; pipelock claude-hook fail-closed default on unsupported hook events strengthening SI-10 Information Input Validation and AC-3 Access Enforcement. Builds on the v2.4 baseline (learn-and-lock per-agent behavioral contracts with signed EvidenceReceipt v2 for CA-2/CA-7 and AU-2/AU-10, inbound mediation envelope verification with replay protection for AU-9(2)/(3) and IA-2/IA-3, SPIFFE actor format with /.well-known/http-message-signatures-directory per RFC 9421 for IA-2/SC-12, X-Pipelock-Block-Reason response header strengthening AU-2 and SC-7 visibility, Gemini provider redaction with the provider plugin shape extending SI-12 / SC-28 coverage), the v2.3.0 baseline (class-preserving request redaction for SI-12 / SC-28, generic SSE streaming with per-event body scanning), and the v2.2.0 baseline (mediation envelope for AU-3(1), expanded signed action receipt coverage across all transports for AU-2/AU-10, taint-aware policy escalation for SI-10, posture verify CLI + CI gate for CA-2/CA-7, companion-proxy deployment for SC-7).


Coverage Summary#

Control FamilyCoverageKey Controls
AC — Access ControlModerateAC-3, AC-4, AC-6, AC-17
AU — Audit and AccountabilityStrongAU-2, AU-3, AU-6, AU-12
CA — Assessment, AuthorizationPartialCA-7
CM — Configuration ManagementModerateCM-2, CM-3, CM-7
IR — Incident ResponseModerateIR-4, IR-5, IR-6
SC — System and CommunicationsStrongSC-4, SC-7, SC-8, SC-13
SI — System and Information IntegrityStrongSI-3, SI-4, SI-7, SI-10

AC — Access Control#

ControlNamePipelock FeatureCoverage
AC-3Access EnforcementTool policy rules enforce per-tool allow/deny decisions. Per-agent profiles with independent budgets and rate limits. Sandbox restricts filesystem and network access.Strong
AC-4Information Flow EnforcementCapability separation: agent (secrets, no network) communicates only through pipelock (network, no secrets). DLP scanning on all egress surfaces prevents secret leakage. Sandbox network namespaces enforce flow boundaries.Strong
AC-4(4)Content Check11-layer scanner pipeline inspects all content: DLP patterns, entropy analysis, prompt injection detection, SSRF prevention. Full-schema tool poisoning detection.Strong
AC-6Least PrivilegePer-agent profiles constrain each agent to specific listeners, rate limits, and data budgets. Sandbox Landlock restricts filesystem to declared paths only. Seccomp restricts syscalls to an allowlist.Strong
AC-6(9)Log Use of Privileged FunctionsEvery tool call, scan decision, and policy action is logged with agent identity, tool name, and timestamp.Strong
AC-17Remote AccessKill switch API with bearer-token authentication and optional IP allowlist. Port isolation prevents agent self-deactivation.Moderate

Gap: Agent identity is config-based (HTTP header or listener binding), not certificate-based. mTLS agent authentication is on the enterprise roadmap.


AU — Audit and Accountability#

ControlNamePipelock FeatureCoverage
AU-2Event LoggingEvery request (allow, block, warn, ask, strip) generates a structured audit event with category, severity, agent identity, and scan reasoning. Every enforcement decision also emits an Ed25519-signed action receipt covering fetch, forward, CONNECT, TLS interception, WebSocket, MCP stdio, MCP HTTP, MCP HTTP reverse proxy, and A2A forward-proxy paths.Strong
AU-3Content of Audit RecordsEvents include: timestamp, agent name, source IP, destination URL/domain, scan result, scanner reason, matched pattern, action taken, duration. Receipts additionally include policy_hash, action_id (UUIDv7), transport, and taint-aware fields (session_taint_level, authority_kind, session_task_id).Strong
AU-3(1)Additional Audit InformationSession profiling adds risk scores, domain burst detection, and behavioral anomaly indicators per session. Mediation envelope (Pipelock-Mediation header) carries the same action ID + policy hash on the wire for downstream correlation.Strong
AU-6Audit Record Review, Analysis, ReportingPrometheus metrics with counters and histograms. Grafana dashboard template. SARIF output for CI integration. Report generation with risk rating and evidence appendix. pipelock session inspect/explain surfaces recent events and trigger/evidence for active airlock escalations.Strong
AU-8Time StampsAll events use RFC 3339 timestamps from the system clock.Strong
AU-10Non-RepudiationAction receipts are Ed25519-signed with a hash-chained sequence (chain_prev_hash, chain_seq). Transcript root commits seal sections of the chain. pipelock verify-receipt and the cross-implementation conformance suite (sdk/conformance/) let third parties verify receipts without trusting pipelock.Strong
AU-12Audit Record GenerationThree emission targets: webhook (async buffered), syslog (UDP), and OTLP (HTTP/protobuf). Prometheus /metrics endpoint. Flight recorder writes receipts as signed JSONL.Strong

Gap: Guaranteed log delivery (persistent queue with retry) is on the enterprise roadmap. Current emission is best-effort with overflow counters.


CA — Assessment, Authorization, and Monitoring#

ControlNamePipelock FeatureCoverage
CA-7Continuous MonitoringHot-reload config (fsnotify + SIGHUP) for live policy updates. Prometheus real-time metrics with alerting integration. Adaptive enforcement escalates risk scores per session.Moderate
CA-7(4)Risk MonitoringAdaptive enforcement tracks per-session risk with automatic escalation from warn to block based on accumulated threat signals. Domain burst detection flags unusual access patterns.Moderate

Gap: Pipelock monitors agent-to-internet traffic continuously but does not perform system-level vulnerability assessment or configuration compliance scanning.


CM — Configuration Management#

ControlNamePipelock FeatureCoverage
CM-2Baseline ConfigurationYAML config with version field and preset modes (strict, balanced, audit). Community rule bundles with Ed25519 signing and version tracking.Moderate
CM-3Configuration Change ControlHot-reload with atomic config swap. Config changes logged. Kill switch state preserved across reloads. Community rules verified against trusted keyring on load.Moderate
CM-7Least FunctionalityStrict mode restricts to allowlisted API domains only. Seccomp syscall allowlist blocks unnecessary kernel operations. Sandbox restricts filesystem to declared paths.Strong
CM-7(5)Authorized SoftwareTool policy rules constrain which MCP tools can execute. Session binding pins tool inventory at session start — unauthorized tool additions are detected.Moderate

Gap: No centralized fleet configuration management. Policy distribution and canary rollouts are on the enterprise roadmap.


IR — Incident Response#

ControlNamePipelock FeatureCoverage
IR-4Incident HandlingKill switch provides emergency deny-all from 4 independent sources (config, API, SIGUSR1, sentinel file). Any source active blocks all traffic. OR-composed: deactivating one source doesn't affect others.Strong
IR-4(1)Automated Incident HandlingAdaptive enforcement automatically escalates from warn to block when per-session risk threshold is exceeded.Moderate
IR-5Incident MonitoringPrometheus metrics track blocked requests by category. Session profiling identifies high-risk sessions. Event emission forwards alerts to SIEM in real time.Strong
IR-6Incident ReportingStructured audit events with MITRE ATT&CK technique mapping (T1048 exfiltration, T1059 injection, T1195.002 supply chain). Report generation produces signed evidence packages.Strong

SC — System and Communications Protection#

ControlNamePipelock FeatureCoverage
SC-4Information in Shared ResourcesPer-agent profiles isolate budgets, rate limits, and session state. Sandbox provides process-level isolation via Landlock, network namespaces, and seccomp.Strong
SC-7Boundary ProtectionCapability separation enforces a network boundary between the agent (privileged, no network) and the internet (via pipelock proxy). 11-layer scanner inspects all cross-boundary traffic.Strong
SC-7(5)Deny by Default / Allow by ExceptionStrict mode denies all traffic except explicitly allowlisted API domains. Fail-closed on timeout, parse error, and context cancellation.Strong
SC-8Transmission Confidentiality and IntegrityTLS interception for CONNECT tunnels with per-host certificate generation. Ed25519 signing for reports, rules, and integrity manifests.Moderate
SC-13Cryptographic ProtectionEd25519 for signing (keys, reports, community rules, integrity manifests). SHA-256 for tool baseline hashing and file integrity. TLS for proxy traffic.Moderate
SC-28Protection of Information at RestAudit logs written with structured JSON. File permissions enforced at 0o600. Community rule bundles verified with Ed25519 signatures.Partial

Gap: SC-28 covers information at rest broadly. Pipelock protects its own config and log files but does not encrypt audit logs at rest. Audit encryption is a consideration for regulated deployments.


SI — System and Information Integrity#

ControlNamePipelock FeatureCoverage
SI-3Malicious Code ProtectionTool poisoning detection scans all schema fields for injected instructions. Response scanning detects prompt injection in tool results. DLP prevents secret exfiltration.Strong
SI-4System MonitoringContinuous scanning of mediated HTTP, WebSocket, and MCP traffic. Prometheus metrics, structured logging, session profiling, and adaptive enforcement provide layered monitoring.Strong
SI-4(4)Inbound and Outbound Communications TrafficBidirectional MCP scanning: outbound (agent-to-server) for DLP leaks, inbound (server-to-agent) for injection. URL scanner covers all HTTP egress. WebSocket frame scanning covers bidirectional channels.Strong
SI-7Software, Firmware, and Information IntegrityBinary integrity monitoring (pipelock integrity). Community rule bundle signature verification. Tool baseline drift detection (SHA-256 per session). SLSA provenance on releases.Strong
SI-10Information Input ValidationMCP input scanning validates tool call arguments for DLP and injection patterns. Shell obfuscation detection (octal, hex, brace expansion, variable substitution, command substitution) normalizes input before matching.Strong

Architectural Note#

Pipelock operates at the application and network layer, providing controls that map most directly to AC-4 (information flow), AU (audit), SC-7 (boundary protection), and SI-3/SI-4 (malicious code and monitoring). Controls requiring organizational process (risk assessment, personnel, physical security) or centralized management (fleet policy, RBAC, SSO) are outside the current scope and planned for the enterprise roadmap.

For FedRAMP and government procurement, pair Pipelock's runtime enforcement with complementary controls: identity management (AC-2, IA family), vulnerability management (RA-5), and centralized policy (enterprise roadmap features).

nist-800-53 | Dosu