CIS Extends Security Controls to AI Agents and MCP
AI relevance: The Center for Internet Security has published the first framework that maps CIS Controls v8.1 — the de facto baseline for enterprise security — across all three layers of the agentic AI stack: LLMs, autonomous agents, and the Model Context Protocol.
Key Details
- CIS released three AI companion guides in partnership with Astrix Security (non-human identity) and Cequence Security (API security): one for LLMs, one for AI agents, and one for Model Context Protocol (MCP).
- The LLM guide addresses prompt injection risks, context window protection, and sensitive data handling during inference.
- The agent guide covers safe tool execution, governed autonomy levels, and access control when agents interact with enterprise systems.
- The MCP guide focuses on secure tool access, non-human identity management, and auditable interactions across the protocol layer.
- CIS emphasizes that no single layer can secure the full AI system — controls must span input sanitization, context protection, tool validation, logging, and output review.
- The guides are built on CIS Controls v8.1, meaning security teams already using the framework can extend existing programs rather than adopting a separate AI-specific standard.
Why It Matters
- Most AI security guidance has been vendor-specific or academic. CIS Controls are widely adopted by enterprise security teams — this gives them a concrete path to govern AI deployments using familiar controls.
- The three-layer model (LLM → Agent → MCP) maps directly to how organizations are deploying agentic AI, making it actionable rather than abstract.
- The partnership with Astrix and Cequence signals that non-human identity and API security are now recognized as core AI security concerns.
What to Do
- If your organization already implements CIS Controls v8.1, review the companion guides to identify gaps in your AI deployment posture.
- Use the MCP guide to audit third-party MCP servers in your agent toolchain — especially around identity and access controls.
- Map your existing agent governance policies to the controls outlined in the agent guide.