Skip to main content
DEPLOYMENT

Deployment Requirements

Operational requirements for deploying AGA cryptographic runtime governance. AGA provides the governance mechanism. The deployer provides the infrastructure isolation and key management that makes it trustworthy.

NETWORK

Network Isolation

The MCP governance proxy is effective only when it is the sole path between the agent and external resources. AGA does not provide network isolation. AGA provides the mechanism to specify, verify, and prove that isolation was in place.

Kubernetes

NetworkPolicy restricting agent pod egress to Portal IP/port only. Admission webhook prevents pods from launching without valid sealed policy.

Standalone

iptables/nftables rules restricting agent process network access to Portal listener. seccomp profile blocking raw socket creation. AppArmor profile confining filesystem access.

Air-Gapped

Physical network isolation. Portal is the only device with external connectivity. Evidence bundles transferred via removable media for offline verification.

KEY MANAGEMENT

Signing Key Requirements

LevelKey StorageRotationSuitability
MinimumFile-based PEM (chmod 0600)Manual via aga rotateDevelopment, testing
RecommendedHSM (FIPS 140-3 Level 3) or TPM 2.0Every 24h or 1,000 receiptsProduction, enterprise
Maximumk-of-n threshold across distributed HSMsAutomated, policy-drivenDefense, critical infrastructure

PQC hybrid keys (ML-DSA-65 + Ed25519) are supported at all levels. The signing key never needs to leave the HSM boundary.

CADENCE

Measurement Cadence

Deployment TypeCadenceTOCTOU WindowRationale
SCADA / ICS100ms100msPLC firmware integrity, actuator state
Autonomous Drone150-250ms150-250msKill-chain governance, ROE compliance
AI Agent (MCP)Per tool call0msSynchronous enforcement, zero TOCTOU
Container / K8s500ms-5s500ms-5sImage hash, runtime config, mount integrity
RETENTION

Evidence Retention

Evidence bundles are self-contained and offline-verifiable. Retention periods depend on the applicable compliance framework.

FrameworkMinimum Retention
DoD Directive 3000.0910 years
NIST AI RMF5 years (recommended)
SOX Section 4047 years
HIPAA Security Rule6 years
EU AI Act (Art. 12)Duration of AI system lifecycle
NIST SP 800-53 (AU-11)Per organizational policy