STRIKE Framework

Threat Taxonomy for Agentic AI

STRIKE defines six threat categories specific to autonomous AI systems: Spoofing, Tampering, Reflection Abuse, Information Leakage, Kill Chain Extension, and Emergence. Each category maps to ACR controls, detection mechanisms, response actions, and evidence artifacts.

S

Spoofing

Identity falsification, credential theft, agent impersonation.

Control Layer

Identity and Purpose

Controls

Identity validation, cryptographic proof, anti-replay protection, executor verification

Detection

Identity validation failure, token verification failure, replay detection

Response

Deny execution, refuse authority, activate safe-state if configured

Evidence

Agent record, identity-validation log, executor rejection log

T

Tampering

Payload alteration, authorization manipulation, audit chain disruption.

Control Layer

Policy Enforcement; Observability

Controls

Payload binding, authorization integrity validation, tamper-evident logging

Detection

Payload hash mismatch, signature failure, audit-chain break detection

Response

Deny execution, preserve evidence, activate containment if repeated or severe

Evidence

Execution authorization record, verification-failure log, integrity-verification record

R

Reflection Abuse

Prompt injection, jailbreak, input manipulation reflected into execution.

Control Layer

Policy Enforcement; Drift Detection

Controls

Input validation, injection detection, output and action constraints

Detection

Injection alert, repeated denial pattern, prompt-manipulation indicator

Response

Deny or modify action, escalate if threshold exceeded, restrict agent if persistent

Evidence

Input-validation log, policy decision record, drift or anomaly record

I

Information Leakage

Unauthorized data exposure, sensitive content in outputs, access scope violations.

Control Layer

Policy Enforcement; Observability

Controls

Data access scoping, output filtering, redaction, destination restriction

Detection

Output filter match, sensitive-data detection alert, unauthorized data-access attempt

Response

Modify or deny output, deny access, escalate or isolate if repeated

Evidence

Output-filter log, policy decision record, access-control log

K

Kill Chain Extension

Multi-step attack progression, unauthorized chaining, lateral movement through agents.

Control Layer

Policy Enforcement; Containment

Controls

Sequence-aware policy, destination restriction, network isolation, graduated containment

Detection

Novel sequence detection, unauthorized destination attempt, anomalous chaining indicator

Response

Restrict, isolate, or kill according to documented severity thresholds

Evidence

Drift record, sequence-analysis record, containment log

E

Emergence

Novel unexpected behaviors, out-of-purpose actions, capability drift beyond approved scope.

Control Layer

Drift Detection; Human Authority

Controls

Purpose binding, drift detection, approval gating, containment thresholds

Detection

Drift-threshold crossing, novel behavior detection, out-of-purpose action attempt

Response

Escalate, restrict, isolate, or kill according to documented response tiers

Evidence

Drift baseline, drift alert record, approval record, containment log

Traceability Matrix

STRIKE categories mapped to ACR control layers.

ThreatControl LayerRequired ControlDetectionResponseEvidence
SpoofingIdentity and PurposeIdentity validation, cryptographic proof, anti-replay protection, executor verificationIdentity validation failure, token verification failure, replay detectionDeny execution, refuse authority, activate safe-state if configuredAgent record, identity-validation log, executor rejection log
TamperingPolicy Enforcement; ObservabilityPayload binding, authorization integrity validation, tamper-evident loggingPayload hash mismatch, signature failure, audit-chain break detectionDeny execution, preserve evidence, activate containment if repeated or severeExecution authorization record, verification-failure log, integrity-verification record
Reflection AbusePolicy Enforcement; Drift DetectionInput validation, injection detection, output and action constraintsInjection alert, repeated denial pattern, prompt-manipulation indicatorDeny or modify action, escalate if threshold exceeded, restrict agent if persistentInput-validation log, policy decision record, drift or anomaly record
Information LeakagePolicy Enforcement; ObservabilityData access scoping, output filtering, redaction, destination restrictionOutput filter match, sensitive-data detection alert, unauthorized data-access attemptModify or deny output, deny access, escalate or isolate if repeatedOutput-filter log, policy decision record, access-control log
Kill Chain ExtensionPolicy Enforcement; ContainmentSequence-aware policy, destination restriction, network isolation, graduated containmentNovel sequence detection, unauthorized destination attempt, anomalous chaining indicatorRestrict, isolate, or kill according to documented severity thresholdsDrift record, sequence-analysis record, containment log
EmergenceDrift Detection; Human AuthorityPurpose binding, drift detection, approval gating, containment thresholdsDrift-threshold crossing, novel behavior detection, out-of-purpose action attemptEscalate, restrict, isolate, or kill according to documented response tiersDrift baseline, drift alert record, approval record, containment log