Back to Delivery
deliveryL5 AutonomousGovernance & Compliance

Enterprise-grade RBAC per agent (Stripe Toolshed model: 400+ MCP tools with access control)

Enterprise-grade RBAC (Role-Based Access Control) per agent means that every AI agent operating in the organization's systems has an explicit, audited identity with a specific set

  • ·Continuous compliance: agent monitors regulatory changes (EU AI Act updates, SOC2 changes) and proposes policy updates
  • ·Audit trail is self-documenting (agent decisions include reasoning, not just outcomes)
  • ·Enterprise-grade RBAC is enforced per agent (Stripe Toolshed model: each agent has scoped permissions for specific tools and repositories)
  • ·Policy update proposals from compliance agent are auto-tested against existing codebase before rollout
  • ·Agent RBAC permissions are audited automatically for least-privilege compliance

Evidence

  • ·Compliance agent logs showing regulatory monitoring and policy update proposals
  • ·Self-documenting audit trail entries with agent reasoning chains
  • ·Agent RBAC configuration showing per-agent tool and repository permissions

What It Is

Enterprise-grade RBAC (Role-Based Access Control) per agent means that every AI agent operating in the organization's systems has an explicit, audited identity with a specific set of capabilities - not the capabilities of the developer who invoked it. An agent that's authorized to read code files is not automatically authorized to push to main, run production queries, or access secrets management. The agent's capabilities are defined by its role, not by the capabilities of the human who launched it.

The Stripe Toolshed model is the most prominent public example of this pattern at scale. Stripe has built an internal MCP (Model Context Protocol) server with 400+ tools representing all of Stripe's internal APIs and systems. Each tool in the Toolshed is associated with an access level; agents are assigned access levels based on their role and the environment they're running in. A documentation-generation agent gets read access to code repositories and the ability to write documentation files. A deployment agent gets access to the deployment pipeline. Neither agent has access to the other's capabilities. The Toolshed is the authorization layer that enforces this separation.

MCP (the Model Context Protocol, standardized by Anthropic) is the technical foundation that makes enterprise RBAC for agents practical. MCP provides a structured interface between AI models and tools/resources, with a server-client architecture that naturally accommodates authorization: the MCP server controls which tools are exposed to which clients, and can enforce access control at the tool invocation level. An enterprise MCP server is not just a tool aggregator - it's an authorization proxy that enforces the RBAC policies for every tool call an agent makes.

At L5 (Autonomous), the agent RBAC model is the mechanism that enables high-autonomy agent operation without expanding human risk exposure. The key insight is that the right response to "this agent is operating autonomously" is not "restrict what it can do" but rather "ensure it can only do what it's authorized to do." A well-designed RBAC system enables broad autonomous operation within defined boundaries - an agent can make hundreds of tool calls per session, all within its authorized capability set, without requiring human approval for each one.

Why It Matters

  • Principle of least privilege for agents - just as production services run with minimal permissions, agents should have exactly the capabilities they need for their task and nothing more. An agent with excess capabilities creates risk both from bugs in agent reasoning and from prompt injection attacks
  • Enables autonomous operation without blanket trust - RBAC is what makes it possible to let an agent run autonomously rather than requiring human approval for each tool call. The agent can act freely within its authorized scope; the RBAC system enforces the boundary
  • Creates an auditable capability model - when every agent has a defined capability set, the question "what could this agent have done?" is answerable from the RBAC configuration rather than from a post-hoc forensic analysis
  • Enables multi-agent systems with capability isolation - in orchestrator/worker architectures, different agents need different capabilities. RBAC enables an orchestrator to spawn workers with restricted capability subsets without the orchestrator needing to manually gate every tool call
  • Satisfies SOC2 access control requirements for automated systems - SOC2 CC6 (Logical and Physical Access Controls) applies to automated systems including AI agents. RBAC for agents provides the documented, reviewed, and auditable access control evidence that SOC2 requires

Getting Started

6 steps to get from here to the next level

Common Pitfalls

Mistakes teams actually make at this stage - and how to avoid them

How Different Roles See It

B
BobHead of Engineering

Bob's organization has 15 autonomous agents operating across production - some generating code, some running deployments, some querying production databases for observability data. The security team has flagged that several of these agents are running with broad developer-level credentials because nobody has set up agent-specific roles. Any of the 15 agents could, in principle, access any system that any developer can access.

What Bob should do - role-specific action plan

S
SarahProductivity Lead

Sarah wants to use agent RBAC data to track a new category of productivity metric: agent autonomy rate by role. For each agent role, what percentage of task completions happen within the authorized capability set without capability escalation requests? A high autonomy rate means the role is well-calibrated for its tasks; a low autonomy rate means agents are frequently hitting capability boundaries that require human escalation.

What Sarah should do - role-specific action plan

V
VictorStaff Engineer - AI Champion

Victor has been designing a multi-agent system for continuous codebase improvement: a planner agent that identifies improvement opportunities, worker agents that implement them, and a validator agent that runs tests. He needs to design the RBAC for this system so that each agent has the capabilities it needs without any of them having excessive access.

What Victor should do - role-specific action plan

Governance & Compliance