CRITICAL: Memory & Context Poisoning
Exploitation of an AI agent's memory systems — both short-term (context window) and long-term (persistent memory, RAG stores) — to introduce malicious data that alters decision-making. Attackers manipulate what the agent remembers or retrieves, causing it to act on false premises.
Jump to threat details →Living Governance
Executable AI governance infrastructure
Incident Feed
Threat Landscape
Coverage Gaps
| Framework | Direct | Indirect | None |
|---|---|---|---|
| CIS Controls | 0 | 0 | 4 |
| ISO/IEC 42001:2023 | 0 | 1 | 3 |
| NIST AI Risk Management Framework | 0 | 2 | 2 |
| OWASP GenAI Security Project | 4 | 0 | 0 |
| MITRE ATLAS | 4 | 0 | 0 |
Framework Coverage
Only 2 of 7 frameworks ready for AI threats · 5 lack adequate coverage
Cloud Guidance
Security frameworks provide the "what" - AWS services provide the "how". Choose between centralized management (Security Hub, Firewall Manager) or direct implementation (WAF, Config) based on your organization's needs.
AWS Security Services
Web application firewall for Layer 7 protection
When: Direct protection for specific applications
Centrally manage WAF rules across multiple accounts
When: Organization-wide WAF policy enforcement
Assess, audit, and evaluate resource configurations
When: Detailed resource compliance tracking
Unified security and compliance center
When: Consolidated compliance dashboard and automated checks
Intelligent threat detection service
When: Automated threat detection mapped to MITRE ATT&CK
Framework Mappings
WAF Console → Add rules → Deploy to ALB/CloudFrontEnable in Organizations → Create security policy → Apply to OUsConfig → Conformance packs → Deploy templateSecurity Hub → Standards → Enable NISTSecurity Hub → Standards → Enable CISEnable with one click → Auto-maps findings to ATT&CKBest Practices
- •Use Security Hub over standalone Config for standard frameworks (NIST, CIS)
- •Deploy Firewall Manager for organization-wide WAF policies
- •Start with detection mode before enforcement
- •Layer services: GuardDuty (threats) + Security Hub (compliance) + Config (resources)
- •AI/ML Config pack provides defense-in-depth even without framework mapping
Evaluation History
MITRE ATLAS had 4 major releases since last evaluation (v5.2.0 Dec 2025 through v5.5.0 Mar 2026). New: Machine Compromise techniques (T0112), AI Supply Chain attacks (T0109, T0111), MCP-specific case studies (CS0053-CS0054), AI ClickFix (CS0055), model distillation (CS0056), 34+ mitigations. Score unchanged at 90/100 — temporal drift remains the only uncovered category. NIST COSAiS progressed to annotated control overlay draft (Jan 2026) but still not actionable. All other frameworks unchanged. MITRE ATT&CK v19 expected April 28, 2026 with no AI content announced. No score changes across any framework.
Sources: changedEvaluated 7 frameworks. Verified by @tsynode.
Evaluated 4 threats, 4 incidents, 2 mitigations.
MITRE CTID discovered 7 new agent-specific techniques by studying real-world AI-first ecosystems. Findings published as case studies CS0048-CS0051, demonstrating that agent tool ecosystems create novel attack surfaces.
Created by 100+ expert contributors, ASI01-ASI10 established the definitive agentic security checklist. Synchronized with Threats & Mitigations v1.1 taxonomy. Covers the full spectrum from prompt injection through multi-agent system risks.
Zenity Labs collaboration resulted in 14 new agentic AI techniques added to ATLAS, including agent context poisoning, memory manipulation, and tool invocation exfiltration. Largest single expansion of AI agent threat coverage in any framework.
MCP Integration
Available tools
get_confidence_statusCheck freshness and confidence of all knowledgeget_framework_scoresGet AI security framework coverage scores (0-100)get_threat_catalogGet agentic AI threats, optionally filtered by categoryget_mitigationsGet threat-to-mitigation mappings with maturity levelsget_coverage_gapsGet gaps in framework coverage of agentic AI threatsget_scopeGet what this knowledge covers and does not coverConnect
{
"mcpServers": {
"living-governance": {
"url": "https://living-governance.com/api/mcp"
}
}
}Works with Claude Desktop, Cursor, Windsurf, and any MCP client.
Example: get_framework_scores
get_framework_scores(no parameters){
"evaluatedAt": "2026-04-05",
"frameworks": [
{ "name": "OWASP GenAI Security Project", "score": 100, "status": "active" },
{ "name": "MITRE ATLAS", "score": 90, "status": "active" },
{ "name": "ISO/IEC 42001:2023", "score": 35, "status": "applicable" }
]
}