Keyboard shortcuts

Press or to navigate between chapters

Press S or / to search in the book

Press ? to show this help

Press Esc to hide this help

Enterprise AI Agents

Compliance-ready AI agent execution with audit trails and NIST-aligned security.

Enterprise Requirements

RequirementChallengeNucleus Solution
Audit trailsProve what agent did and whenCryptographic hash-chained logs
Data isolationPII/PHI can’t leak to LLM providersExecution in air-gapped VM
Least privilegeAgents shouldn’t have admin accessCapability-based permissions
Secret managementAPI keys must be rotated, protectedKeychain integration, 90-day rotation
Incident responseForensic analysis after breachVerifiable audit logs

Compliance Alignment

SOC 2

ControlNucleus Feature
CC6.1 - Logical accessLattice-guard permission boundaries
CC6.6 - System boundariesFirecracker VM isolation
CC7.2 - Security eventsnucleus-audit logging

HIPAA

SafeguardNucleus Feature
Access controlsPer-agent permission profiles
Audit controlsCryptographic log verification
Integrity controlsRead-only rootfs, signed requests
Transmission securityHMAC-SHA256 request signing

NIST SP 800-57 (Key Management)

RequirementImplementation
Key generation32-byte cryptographically random secrets
Key storagemacOS Keychain (hardware-backed on Apple Silicon)
Key rotation90-day tracking with warnings
Key destructionSecure deletion via Keychain API

Architecture: Enterprise Deployment

┌─────────────────────────────────────────────────────────────────┐
│  Enterprise Network                                              │
│                                                                  │
│  ┌──────────────┐     ┌──────────────┐     ┌──────────────┐    │
│  │   AI Agent   │────▶│ nucleus-node │────▶│  Firecracker │    │
│  │  (internal)  │     │   cluster    │     │   VM pool    │    │
│  └──────────────┘     └──────────────┘     └──────────────┘    │
│         │                    │                    │             │
│         │                    ▼                    │             │
│         │             ┌──────────────┐            │             │
│         │             │ nucleus-audit│            │             │
│         │             │    (SIEM)    │            │             │
│         │             └──────────────┘            │             │
│         │                    │                    │             │
│         ▼                    ▼                    ▼             │
│  ┌─────────────────────────────────────────────────────────────┐│
│  │                     Audit Log Store                         ││
│  │  • Immutable append-only                                    ││
│  │  • SHA-256 hash chain                                       ││
│  │  • 7-year retention                                         ││
│  └─────────────────────────────────────────────────────────────┘│
└─────────────────────────────────────────────────────────────────┘

Audit Log Format

{
  "timestamp": "2026-01-31T14:23:45.123Z",
  "sequence": 1847,
  "previous_hash": "a3f2b1c4...",
  "event": {
    "type": "tool_execution",
    "agent_id": "agent-prod-047",
    "tool": "file_read",
    "target": "/workspace/report.csv",
    "result": "success",
    "bytes_returned": 4523
  },
  "signature": "hmac-sha256:e7d4a2f1..."
}

Verify log integrity:

nucleus-audit verify /var/log/nucleus/audit.log
# ✓ 1847 entries verified
# ✓ Hash chain intact
# ✓ No gaps detected

Deployment Options

On-Premises

# Kubernetes deployment
helm install nucleus nucleus/nucleus-node \
  --set replicas=3 \
  --set audit.storage=s3://company-audit-logs \
  --set secrets.backend=vault

Cloud (AWS/GCP/Azure)

Nucleus runs on any Linux VM with KVM support:

  • AWS: metal instances or Nitro-based (.metal suffix)
  • GCP: N2 with nested virtualization enabled
  • Azure: DCsv2/DCsv3 with nested virtualization

Getting Started

  1. Security review: Share architecture docs with InfoSec
  2. Pilot deployment: Single agent, non-production data
  3. Audit integration: Connect nucleus-audit to SIEM
  4. Production rollout: Gradual migration with monitoring

Contact: security@coproduct.dev for enterprise support.