v1.0
L2 StandardManual verification
5.3 Credential Scope Limitation
5. Credential Protection — How do we protect secrets?
Description
Credentials MUST be scoped to minimum required access.
Rationale
If an agent is compromised, the blast radius is limited by credential scope.
Audit Procedure
1. List all credentials the agent can access 2. Document permissions granted 3. Compare against required permissions
Remediation
1. Create dedicated service accounts 2. Apply least privilege 3. Use fine-grained IAM policies
Framework Mappings
CIS Control 5.4CIS Control 6.8NIST PR.AC-4