Resource · Frameworks comparison

AI security frameworks compared

NIST AI RMF, MITRE ATLAS, and OWASP — what each framework covers, where each stops, and where infrastructure-level enforcement closes the gap.

Scroll for report
Cameron McClellanBy Cameron McClellan
Published

Security teams picking an AI security framework in 2026 are choosing between three distinct approaches with almost no overlap. NIST AI RMF is an organizational governance process. MITRE ATLAS is an adversary threat catalog. OWASP is a practitioner-facing vulnerability taxonomy, maintained across three separate publications for different layers of the AI stack. None of them address the same problem. Using any one as your complete AI security program leaves real, specific gaps in your coverage.

This piece maps all three side by side: scope, audience, enforcement layer, and where each stops. It is a companion to What is AI security?, which maps the vendor and product landscape. The OWASP Agentic Top 10 is covered in depth in its own post: The OWASP Agentic Top 10, explained.

NIST AI Risk Management Framework

AI RMF 1.0 was published in January 2023. It is voluntary, non-regulatory, and sector-agnostic. Its purpose is to give organizations a structured process for identifying, assessing, and managing AI risk — not a catalog of technical vulnerabilities or a list of controls to deploy.

The framework organizes AI risk management into four functions:

  • Govern. Establish organizational practices, policies, and accountability structures for AI risk.
  • Map. Categorize AI systems, identify context and stakeholders, and enumerate risks associated with each system.
  • Measure. Analyze, assess, benchmark, and monitor AI risks using qualitative and quantitative methods.
  • Manage. Prioritize, respond to, and document actions taken to address identified risks.

The GenAI Profile (NIST AI 600-1), published July 2024, extends the framework to generative AI specifically. It formalizes 12 GenAI risk categories — including Data Privacy, Information Security, and Value Chain and Component Integration — and maps more than 200 suggested actions across the four functions. The Information Security category gestures toward runtime controls like logging, access management, and output filtering, but without specifying what those controls must be or how they must be implemented.

In February 2026, NIST’s Center for AI Standards and Innovation (CAISI) launched the AI Agent Standards Initiative, with initial deliverables expected later in 2026.

Where NIST AI RMF stops

NIST AI RMF specifies no prescriptive technical controls. It does not mandate tooling, certification, runtime governance, or enforcement mechanisms. It does not describe how to intercept a model call, enforce tool-call policy, detect prompt injection in production, or attribute agent actions to specific users.

It is voluntary unless adopted by contract or sector regulator. An organization can satisfy NIST AI RMF entirely through documentation and governance process without deploying a single runtime control.

Audience: Governance, risk, compliance, and AI leadership teams.

Enforcement layer: Organizational / process. NIST provides the accountability structure but does not prescribe the infrastructure that enforces it.


MITRE ATLAS

MITRE ATLAS (Adversarial Threat Landscape for Artificial-Intelligence Systems) is a knowledge base of adversary tactics, techniques, and case studies targeting AI and ML systems — the AI equivalent of MITRE ATT&CK. Tactics map to techniques, which map to documented case studies of real-world adversary behavior.

ATLAS launched with founding contributors including Microsoft, IBM, Bosch, and NVIDIA, and is now maintained through MITRE’s Secure AI collaboration with a broader set of enterprise partners. Version 5.1.0 (November 2025) includes 16 tactics, 84 techniques, 56 sub-techniques, 32 mitigations, and 42 case studies. A collaboration with Zenity Labs in October 2025 added 14 agent-focused techniques and sub-techniques, including AI agent context poisoning and exfiltration via agent tool invocation. ATLAS draws the majority of its tactics from ATT&CK and adds ML-specific ones: ML Model Access, ML Attack Staging, and AI-tuned variants of Discovery and Resource Development.

For blue teams, ATLAS is the most direct input to detection engineering: it tells you which adversary techniques to instrument against and what events to capture. Its 32 mitigations — input filtering, adversarial training, model sandboxing — are directional starting points, not prescriptive controls.

Where MITRE ATLAS stops

ATLAS describes adversary behavior, not defender architecture. It does not cover identity design, access control, governance processes, or compliance mapping. An organization that builds every ATLAS-suggested mitigation still needs separate answers to questions like: who is authorized to call which tools, how are credentials managed, and what constitutes a complete audit trail.

Audience: Red teams, threat-intelligence practitioners, security engineers building detection rules.

Enforcement layer: Threat model / detection. ATLAS informs what to detect; the enforcement infrastructure must be built separately.


OWASP

The Open Worldwide Application Security Project takes an engineer-first approach to AI security. Unlike NIST (governance process) and MITRE (adversary behavior), OWASP enumerates specific vulnerability classes at each layer of the AI stack and maps what must be defended against at each point.

OWASP’s AI security scope spans three layers. At the application layer, the framework addresses how model calls go wrong: prompt injection, sensitive information disclosure, data and model poisoning, excessive agency, system prompt leakage, and unbounded consumption. At the agentic layer, it addresses the threat categories that emerge when agents operate with tools, persistent memory, and multi-step plans — tool misuse, identity and privilege abuse, inter-agent communication vulnerabilities, cascading failures, and memory and context poisoning. At the protocol layer, it addresses risks specific to how agents connect to external tools and data sources: token mismanagement, privilege escalation, tool poisoning, command injection, insufficient authentication, and gaps in audit telemetry.

This coverage is the most prescriptive of the three frameworks. OWASP names specific vulnerability classes, describes the attack pattern, and maps each risk to the enforcement layer where it must be addressed.

Where OWASP stops

OWASP is a vulnerability taxonomy. It describes what can go wrong at each layer; it doesn’t prescribe an organizational program for managing risk over time, map to regulatory frameworks, or create accountability structures. For compliance evidence and governance process, that is NIST’s lane.

Audience: Security engineers, architects, and platform teams building or governing AI applications and infrastructure.

Enforcement layer: Application → system → protocol. Spans from the LLM gateway through the MCP gateway to agent hooks and identity.


What each framework gives you

NIST AI RMFMITRE ATLASOWASP
Core purposeOrganizational governance processAdversary threat intelligenceVulnerability taxonomy
Key question”Are we managing AI risk responsibly?""What will attackers do to our systems?""What can go wrong at each layer of the stack?”
Primary outputRisk register, accountability documentation, AI inventoryAdversary technique catalog, detection engineering inputsControl requirements mapped to each layer of the AI stack
Who uses itGRC, AI leadership, boardsRed teams, threat-intel practitioners, security engineersPlatform engineers, architects, security teams
Regulatory valueYes — structured evidence for auditorsNoNo
Runtime enforcementNot addressedNot addressedMapped by layer; implementation not prescribed

The last row highlights the enforcement gap each framework leaves. NIST tells you to govern your runtime controls but doesn’t specify what they are. MITRE tells you which adversary techniques to instrument against but not where in the stack to put the instrumentation. OWASP goes furthest — it maps specific vulnerability classes to the enforcement layer where each must be addressed — but stops short of prescribing implementations. In every case, the actual deployment — identity layer, gateway enforcement, audit logging, agent hooks — is left to the organization.


No single framework is sufficient

An enterprise that adopts only one of these three frameworks will have specific, predictable gaps.

NIST AI RMF alone produces a governance process with no runtime controls. An organization that is fully NIST-aligned — documented risk register, completed AI inventory, mapped GenAI risk categories — can still have agents making ungoverned tool calls to production databases with no audit trail. NIST doesn’t specify what to deploy; it specifies how to manage what you deploy.

MITRE ATLAS alone gives threat intelligence with no defensive architecture. Knowing that prompt injection chains and memory manipulation attacks exist tells you what to detect. It doesn’t tell you where in the stack to put the detection, who is authorized to call which tools, or how to design the identity layer that makes access auditable.

OWASP alone gives precise vulnerability taxonomy with no organizational governance. A team that has implemented controls against every relevant OWASP category still needs an accountability structure, a risk management process, and a way to demonstrate due diligence to auditors and boards. OWASP publications are not compliance evidence; they are engineering references.

A mature program draws from all three: NIST for organizational process and accountability, MITRE for threat intelligence and detection engineering, and OWASP for the specific controls to build at each infrastructure layer. The three frameworks are complementary by design — not because they were coordinated, but because they address genuinely different parts of the same problem.


The architectural answer

Each framework describes risk or process at a different layer. Enforcing that risk requires infrastructure at that layer.

The AI control plane is the architecture that spans the full stack: a shared identity foundation beneath model calls (via an LLM gateway or agent hooks architecture) and tool calls (via an MCP gateway), providing runtime interception, tamper-evident audit logging, and an organizational governance layer that maps to NIST’s four functions. Speakeasy is building this control plane as a unified platform — the first to address both the model and tool call layers — with enterprise controls still in active development.

The practical starting point for most enterprises is the layer where exposure is most immediate. For organizations with production MCP deployments, that’s the MCP gateway — the enforcement point for tool-call authentication, credential management, and schema validation, where AI infrastructure vulnerabilities are most actively concentrated. For organizations primarily concerned with model-call governance, it’s the LLM gateway. For organizations running an AI governance initiative, it’s mapping the existing stack against NIST’s four functions to surface what’s documented versus what’s actually enforced.

The frameworks in this piece are the map. The AI control plane is what enforcement looks like when that map is turned into deployed infrastructure. For the full vendor and product landscape across all five enforcement layers, see What is AI security?.


A note on Speakeasy

Speakeasy builds the AI control plane — the enforcement infrastructure that all three frameworks require but none specifies.

All three frameworks exist to help organizations navigate the same challenge: secure and controllable AI adoption. Speakeasy is building the AI control plane to enforce the policies these frameworks help organizations define. The MCP gateway enforces tool-call authentication, access policy, and credential management on every agent-to-tool interaction. The LLM gateway governs model calls. Agent hooks intercept tool execution at runtime. Tamper-evident audit logging covers the audit trail that NIST’s Manage function requires but doesn’t specify how to build.

The AI control plane is the reference architecture that maps this enforcement infrastructure across all three frameworks.

Frequently asked questions

No single framework is sufficient. NIST AI RMF provides the organizational governance process. MITRE ATLAS maps adversary techniques for red teams. OWASP LLM Top 10 addresses model-layer vulnerabilities in applications. OWASP Agentic Top 10 addresses agent-system threats. OWASP MCP Top 10 addresses protocol and server-layer risks. A mature enterprise security program draws from all five, layered against an enforcement architecture — not a single checklist.

The NIST AI Risk Management Framework is voluntary and non-prescriptive. It defines four functions — Govern, Map, Measure, Manage — and more than 200 suggested actions across them. The GenAI Profile (NIST AI 600-1, July 2024) maps 12 generative AI risk categories to those functions. NIST does not specify required tooling, certification, runtime controls, or enforcement mechanisms. A framework adopter must determine their own technical controls. NIST is relevant to procurement, contractual obligations, and sector-specific regulatory adoption, but it does not tell security teams what to deploy.

MITRE ATLAS (Adversarial Threat Landscape for AI Systems) applies the ATT&CK knowledge-base model to AI and ML systems. Where ATT&CK maps adversary techniques against enterprise IT, ATLAS maps adversary techniques against AI models — adversarial examples, model inversion, data poisoning, and prompt injection. ATLAS v5.1.0 (November 2025) includes 16 tactics, 84 techniques, and 56 sub-techniques covering agentic AI. It inherits 13 tactics from ATT&CK and adds ML-specific ones. Like ATT&CK, ATLAS describes adversary behavior and case studies, not a complete defensive architecture.

The OWASP LLM Top 10 was designed around the single-model-call boundary: risks that arise when an application submits prompts and receives completions. The Agentic Top 10 was designed for systems of agents: multi-step orchestration, tool use, persistent memory, inter-agent communication, and long-running autonomous workflows. The Agentic list introduces threat categories that have no equivalent in the LLM list — rogue agents, cascading failures, inter-agent communication attacks, and identity inheritance abuse — because these risks don't exist at the single-call level.

The OWASP MCP Top 10 addresses risks specific to the Model Context Protocol: the standard that governs how AI agents connect to external tools and data sources. Published in 2025 and currently in beta, it covers ten risk categories including token mismanagement, privilege escalation, tool poisoning, supply chain attacks, command injection, and shadow MCP servers. Between January and February 2026, more than 30 CVEs were filed against MCP servers, clients, and tooling. The MCP Top 10 is the most operationally relevant framework for organizations deploying production MCP infrastructure.

Frameworks describe risks; enforcement requires infrastructure. The model gateway (LLM gateway) handles prompt and completion inspection — relevant to OWASP LLM Top 10 risks. The MCP gateway handles tool-call authentication, credential management, schema validation, and access policy — relevant to OWASP MCP Top 10 and Agentic Top 10 ASI02, ASI03. Agent hooks handle pre- and post-tool-call interception and planner oversight — relevant to ASI01, ASI05, ASI06, ASI10. Tamper-evident audit logging is addressed most explicitly by MCP08. Identity and OAuth token management is addressed by MCP01, MCP07, ASI03, and the pending NIST Agent Interoperability Profile (expected Q4 2026). No single product covers all enforcement layers.

None of these five frameworks are legally mandated in themselves. NIST AI RMF is voluntary unless adopted by contract or sector regulator. MITRE ATLAS, OWASP LLM Top 10, OWASP Agentic Top 10, and OWASP MCP Top 10 are community-maintained references with no regulatory force. Regulated industries (financial services, healthcare, defense) may face sector-specific AI requirements that reference NIST standards or OWASP guidance, and the EU AI Act creates obligations for high-risk AI systems in European markets. In practice, enterprise procurement increasingly asks vendors to demonstrate alignment with these frameworks as a proxy for security maturity.

AI everywhere.