Skip to content

Reading Paths

This site covers a lot of ground. These curated paths help you find what matters most based on what you are trying to achieve. Each path is a suggested sequence, not a strict order. Skip what you already know, dive deeper where you need to.

Looking for role-based guidance?

The Stakeholder Views pages provide tailored entry points for security leaders, risk teams, architects, engineers, product owners, and more. Each one includes a starting path, concrete first actions, and answers to common objections.

By goal

"I need to understand the threat landscape"

  1. Why Guardrails Aren't Enough
  2. RAG Is Your Biggest Attack Surface
  3. The MCP Problem
  4. When Agents Talk to Agents
  5. You Don't Know What You're Deploying
  6. State of Reality

"I need to secure multi-agent systems"

  1. MASO Framework overview
  2. Prompt, Goal & Epistemic Integrity
  3. Identity & Access
  4. Execution Control
  5. Privileged Agent Governance
  6. Multi-Agent Controls
  7. Worked Examples

"I need templates and practical artefacts"

  1. Implementation Checklist
  2. Threat Model Template
  3. AI Incident Playbook
  4. Vendor Assessment Questionnaire
  5. Model Card Template
  6. Use Case Examples

"I want to see real-world examples"

  1. Customer Service AI
  2. Internal Doc Assistant
  3. Credit Decision Support
  4. High-Volume Customer Comms
  5. Fraud Analytics
  6. Red Team Playbook

Still not sure where to start?

The Quick Start guide gives you a condensed overview you can read in a few minutes. The FAQ answers common questions about scope, applicability, and how the framework relates to existing standards.