Skip to content

Technical Reference

Deep dives on controls, infrastructure, operations, and metrics. Grouped by purpose so you can find the page you need without scanning the whole list.

Judge Internals

Building, selecting, validating, and operating the judge model.

Document Description
Model-as-Judge Implementation Detailed judge implementation, including prompt structure and scoring.
Judge Model Selection Selection principles: family diversity, cost, latency, safety posture.
Judge Precedents Building a precedent library so judge decisions stay consistent.
Distilling the Judge into an SLM Moving from a large-model async judge to an inline sidecar SLM.
Output Evaluator Output-side evaluation patterns that complement judge rulings.

Detection and SOC

Integrating AI runtime telemetry into security operations.

Document Description
SOC Integration SOC architecture, alert taxonomy, triage procedures.
SOC Content Pack SIEM detection rules, correlation searches, dashboards.
Anomaly Detection Ops Behavioural anomaly detection, operated as a programme.
Behavioral Anomaly Detection Detection techniques and baselines for agent behaviour.
Graph-Based Agent Monitoring Graph approaches to watching delegation and tool-call networks.
Multi-Agent Failure Analysis Post-incident analysis patterns for multi-agent failures.
Runtime Telemetry Reference Canonical telemetry fields, events, and formats.
Operational Metrics Metrics catalogue for judges, guardrails, and the overall stack.

Control Catalogues

The working catalogues of controls, solutions, and hardening guidance.

Document Description
Agentic Controls Catalogue The working catalogue of controls for agentic deployments.
Agentic Controls Extended Extended agentic control guidance and edge cases.
Technical Controls Network, WAF, DLP, gateway controls for AI traffic.
Current Solutions Industry solutions implementing this pattern.
Control Selection Guide Methodology for choosing and sequencing controls.
AI Endpoint Hardening Hardening the model endpoint, gateway, and tool server.
RAG Security RAG pipeline security, from ingestion to retrieval.

Economics and Identity

Cost, governance, and non-human identity considerations.

Document Description
Cost and Latency Cost and latency impact of each control layer.
Economic Governance Budget, attribution, and economic guardrails for AI workloads.
NHI Lifecycle Non-human identity lifecycle management.
Supply Chain Controls AI supply chain security controls, from weights to packages.
Humans in the Business Process Where humans sit in the operational loop, and what they do there.