Threat Model

This document describes the explicit threat model for BeaconGuard Assurance. It enumerates assumptions, assets, threat categories, and mitigations.

The goal is not to claim absolute security, but to make attack surfaces, failure modes, and protections explicit and reviewable.


Security Assumptions

BeaconGuard operates under the following assumptions:

If these assumptions do not hold, BeaconGuard makes no guarantees.


Protected Assets

BeaconGuard is designed to protect the following assets:


Threat Categories

Policy Tampering

Threat: An attacker modifies policy logic or semantics without detection.

Mitigations:


Unauthorized Authorization Bypass

Threat: An attacker attempts to force an ALLOW decision through malformed inputs or fallback paths.

Mitigations:


Audit Record Manipulation

Threat: An attacker deletes, alters, or suppresses audit records.

Mitigations:


Replay Forgery

Threat: An attacker attempts to fabricate replay inputs to misrepresent historical decisions.

Mitigations:


Time-of-Check / Time-of-Use (TOCTOU)

Threat: Policy or artifact changes between authorization and audit recording.

Mitigations:


Model-Induced Side Effects

Threat: AI model behavior influences authorization semantics indirectly.

Mitigations:


Non-Goals and Explicit Exclusions

BeaconGuard does not attempt to mitigate:

These are intentionally out of scope and must be addressed by surrounding controls.


Residual Risk

Residual risk is explicitly acknowledged:

BeaconGuard prioritizes visibility and determinism over silent tolerance.