Access & Isolation
Enforce least privilege for tool execution, secrets access, and outbound network calls. Encourage teams to sandbox third-party connectors where feasible.
Rotate secrets automatically and document how to revoke compromised credentials without downtime.