How to Secure Enterprise AI Agents with OpenShell: A Step-by-Step Deployment Guide
Introduction
Enterprise software stacks were built for human interaction—handling credentials manually, operating at human speed, and relying on human oversight for every action. Autonomous AI agents break all three assumptions: they operate at machine speed, run indefinitely, and require a new security model. Nvidia's OpenShell, an Apache 2.0 open-source secure runtime for autonomous agents, addresses this by providing a sandboxed environment that isolates agents from host infrastructure, prevents credential leakage, and enforces governance controls. This guide walks you through deploying OpenShell to secure your enterprise AI agents.

What You Need
- Nvidia Agent Toolkit – includes OpenShell and supporting utilities.
- OpenShell runtime (Apache 2.0 license) – available from Nvidia's repository.
- Linux system with kernel support for seccomp, eBPF, and Landlock (recommended: Ubuntu 22.04+ or RHEL 9+).
- Service accounts for external enterprise services (e.g., ServiceNow, Salesforce, Workday) with API tokens or OAuth credentials.
- Basic understanding of containerization (Docker/Podman) and Linux security modules.
- Access to a test environment for initial deployment before production rollout.
Step-by-Step Deployment
Step 1: Set Up the OpenShell Sandbox Environment
OpenShell isolates each agent inside its own sandbox. Begin by installing the OpenShell runtime from the Nvidia Agent Toolkit. Use the package manager or container image provided. Configure the sandbox parameters:
- Define resource limits (CPU, memory, network) per sandbox.
- Enable seccomp profiles to restrict system calls the agent can make.
- Apply Landlock rules to limit file system access to only required directories.
Test the sandbox by launching a simple, non-autonomous agent to verify isolation. The agent should not be able to reach the host operating system or network outside its allowed scope.
Step 2: Deploy the Gateway for Credential Management
Outside each sandbox, deploy the OpenShell gateway. This component holds credentials and session state for external services. Never store API keys or tokens inside the sandbox itself. Configure the gateway to:
- Authenticate with each enterprise service using service accounts.
- Manage session tokens and refresh them automatically.
- Pass authenticated sessions into the sandbox only when the agent makes a valid request.
This pattern ensures that even if an agent is compromised (e.g., via prompt injection), the attacker cannot extract credentials. The gateway acts as a security controller for all external interactions.
Step 3: Deploy the Agent with Its Harness Inside the Sandbox
Place the agent—including its model, harness, and any runtime dependencies—inside the sandbox created in Step 1. The agent should have no direct access to external networks or the gateway's credential store. Instead, define a restricted API that the agent can use to request actions (e.g., "create ticket in ServiceNow"). The gateway will evaluate the request, attach credentials, and execute it on the agent's behalf.
- Use the OpenShell agent harness to wrap your existing agent code.
- Configure the harness to communicate only through the gateway's local interface.
- Log all agent-gateway interactions for audit purposes.
Step 4: Enforce Policies Below the Application Layer
OpenShell leverages Linux kernel primitives—seccomp, eBPF, and Landlock—to enforce security policies at the kernel level, not just within the application. This is the "baked-in" security model Nvidia advocates. Implement the following:

- Write eBPF programs to monitor and filter network egress from each sandbox.
- Apply seccomp rules that deny any system call not explicitly required by the agent.
- Use Landlock to restrict file system access to a read-only snapshot of model weights and configuration files.
These policies run below the agent's awareness, providing a defense-in-depth layer that cannot be bypassed by application-level bugs.
Step 5: Monitor, Audit, and Rotate
Once agents are deployed, continuous monitoring is essential. OpenShell provides logging for sandbox activities, gateway authentication attempts, and policy violations. Establish a workflow to:
- Review gateway logs for anomaly patterns (e.g., repeated failed authentications).
- Rotate service account credentials periodically—the gateway handles rotation seamlessly.
- Update seccomp/eBPF profiles as agent behavior evolves.
- Test blast radius containment by simulating a compromised agent and verifying the sandbox limits damage.
Document all policies and audit findings for compliance with enterprise security standards (SOC2, ISO 27001, etc.).
Tips for Success
- Start small: Deploy a single non-critical agent first to validate the sandbox and gateway configuration before scaling.
- Minimal permissions: Grant the agent the least privilege necessary—only the services and actions it truly needs.
- Test prompt injections: Use your security team to attempt to trick the agent into requesting unauthorized actions. The gateway should reject any request that doesn't match predefined patterns.
- Use dedicated service accounts: Each enterprise service should have a unique service account used only by the OpenShell gateway, not by any human user or other system.
- Log everything: Enable verbose logging during initial deployment, then reduce to only security-relevant events in production.
- Stay updated: OpenShell is actively developed by Nvidia. Regularly pull the latest version to benefit from new kernel-level protections and gateway features.
By following these steps, you can deploy autonomous AI agents that operate at machine speed without sacrificing security—a critical requirement for modern enterprise environments.
Related Articles
- 10 Ingenious Steps to Build Your Own TV Remote with an Arduino
- How to Kickstart Your Personalization Strategy with a Prepersonalization Workshop
- Finance AI Adoption Hits 88% but Scaling Remains a Critical Bottleneck: McKinsey Survey Reveals One-Third of Firms Exit Pilot Phase
- How to Analyze Google Pixel 11 Rumors and Fitbit Air Leaks: A Practical Guide for Tech Enthusiasts
- Global Law Enforcement Stuns Cybercrime: Four IoT Botnets Dismantled After Targeting 3 Million Devices
- Roomba Creator Launches a Lifelike Robot Pet for Home Companionship
- Rice-Sized Optical Sensor Gives Robots a Delicate Touch: Q&A
- Global Law Enforcement Shuts Down Four IoT Botnets Behind Record DDoS Attacks