Production Checklist¶
Before running AI agents unsupervised in production, verify each item.
Security¶
- User separation — Rampart runs as a dedicated
rampart-svcuser (guide) - Agent is non-root — Your AI agent runs as an unprivileged user
- Sudo is restricted — Agent's sudo access limited to specific commands
- Policy reviewed — All YAML policies reviewed and tested
- Default action — Set to
denyfor high-security environments
Monitoring¶
- SIEM export enabled —
--syslogor--cefsending to your SIEM (guide) - Webhook notifications — Alerts configured for
denyevents (guide) - Service monitoring — Rampart process monitored (systemd, Nagios, etc.)
- Audit verification — Periodic
rampart audit verifyin cron
Reliability¶
- Auto-restart — Systemd/launchd configured with
Restart=always - Fail-open understood — Team knows commands pass through if Rampart is down
- Log rotation — Audit directory has adequate disk space
- Backup — Policy files and audit logs are backed up
Policies¶
- Credential protection — SSH keys, AWS creds, env files blocked
- Exfiltration protection — Known exfil domains blocked
- Destructive commands —
rm -rf,mkfs,ddblocked - Response scanning — Credential patterns in output detected
- Anti-exfiltration — Encoding + network pipe patterns blocked
Testing¶
- Policy validation —
rampart policy checkpasses - Deny test — Confirmed a blocked command returns error
- Allow test — Confirmed normal commands work
- Webhook test — Notifications arrive on deny
- Chain verification —
rampart audit verifypasses
Documentation¶
- Runbook — Team knows how to approve pending commands
- Escalation — Process for reviewing audit anomalies
- Upgrade plan — Re-patch file tools after framework upgrades