주요 콘텐츠로 건너뛰기

Define Agent Collection Taxonomy

Implementation Effort: Medium – Requires cross-team alignment between security, compliance, and business unit stakeholders to agree on grouping criteria and ownership model.
User Impact: Low – Admin-only activity; the taxonomy governs how administrators organize agents in the registry and does not affect end-user workflows.

Overview

Before organizing agents into registry collections, organizations need a deliberate taxonomy that defines the criteria for grouping agents and the ownership model for each collection. Without this, collections become ad-hoc groupings that reflect whichever administrator created them rather than the organization's governance structure. The taxonomy applies to all agents — those discovered during initial inventory, newly built agents published through development workflows, and third-party agents onboarded through the Custom Engine Agent framework.

Common taxonomy dimensions include business unit or department (grouping agents by the team that owns them), risk level (separating agents that access sensitive data from those that do not), data classification (aligning collections with the organization's data sensitivity labels), compliance scope (isolating agents subject to regulatory requirements like HIPAA, PCI-DSS, or GDPR), and agent type (distinguishing between first-party, third-party, and custom-built agents). Most organizations use a combination of these dimensions, creating a primary grouping (such as business unit) with secondary attributes (such as risk level) that inform review cadence and monitoring intensity.

This activity supports Verify Explicitly by ensuring that every agent's collection membership provides immediate context about its risk profile, ownership, and compliance requirements — enabling administrators to make informed access decisions without investigating each agent individually. It supports Use Least Privilege Access by enabling scoped administrative delegation: collection owners manage their own agents while central security retains oversight of the full registry, preventing any single role from having unnecessary broad access. It supports Assume Breach by enabling segmented response — when a security incident involves an agent, the collection taxonomy immediately identifies related agents that share the same risk profile or data access patterns, allowing security teams to assess blast radius quickly.

Without a defined taxonomy, organizations accumulate collections organically, leading to overlapping groups, orphaned agents that belong to no collection, and inconsistent review coverage. Threat actors benefit from this disorganization because agents in poorly governed collections receive less scrutiny and may retain excessive permissions longer than necessary.

Reference