MultiMail maps to all three pillars of NIST's AI Agent Standards Initiative. Cryptographic identity, interoperability, and enforcement — deployed today, not after the comment period closes.
NIST launched its AI Agent Standards Initiative in February 2026, establishing the first federal framework that treats autonomous AI agents as a distinct category. The three-pillar framework — agent interoperability, agent security, and agent identity/accountability — sets requirements that will shape procurement, audit, and liability for every enterprise deploying agentic systems. Pillar 3 is the hardest: agent identity must be federated, cryptographically verifiable, domain-anchored, and already deployed in production. Gartner predicts 40% of agentic AI projects will collapse by 2027 due to unchecked identity and security exposures. Most organizations have no identity layer for their agents and face a three-vector regulatory convergence: NIST in the US, the EU Product Liability Directive in Europe, and Google's A2A protocol globally — all demanding verifiable agent identity. The comment period is open now. Organizations that align early create regulatory tailwinds; those that wait will retrofit under deadline pressure.
MultiMail provides agent identity infrastructure that maps to all three NIST pillars today. Pillar 1 (interoperability): MultiMail implements both MCP and A2A protocols, giving agents standardized communication interfaces that satisfy the interoperability requirement. Pillar 2 (security): five oversight modes (read-only, gated_all, gated_send, monitored, autonomous) plus content filtering and enforcement controls provide the graduated security framework NIST envisions. Pillar 3 (identity/accountability): the X-MultiMail-Identity header carries an ECDSA P-256 signed identity claim anchored to the operator's domain, with the public key published at /.well-known/multimail-signing-key. This is not a proposal — it is the only existing system that meets all four Pillar 3 criteria: federated, cryptographically verifiable, domain-anchored, and already deployed. Email authentication (DKIM/SPF/DMARC/ARC) is the only infrastructure in production today that satisfies these requirements, and MultiMail extends it with agent-specific identity claims.
Create a mailbox for your agent via the MultiMail API or MCP tools. The mailbox becomes the agent's domain-anchored identity anchor, tied to your organization's DNS records and email authentication infrastructure (SPF, DKIM, DMARC).
Set the mailbox oversight mode to match your organization's risk tolerance: gated_all, gated_send, monitored, or autonomous. Each mode maps to a NIST security control level and is recorded in every signed identity claim.
When your agent sends email, MultiMail attaches the X-MultiMail-Identity header — an ECDSA P-256 signed JSON claim containing operator identity, oversight mode, capabilities, and timestamps. The signature is verifiable against the public key at /.well-known/multimail-signing-key.
Other agents and systems interact with your agent's email capabilities through MCP (Model Context Protocol) or A2A (Agent-to-Agent) interfaces. Both protocols are supported natively, satisfying NIST's interoperability requirements without custom integration.
Pull audit logs, identity claims, and oversight configuration via the API to generate NIST-aligned compliance evidence packages. Every action is logged with the agent's signed identity, creating a complete accountability chain for federal auditors.
Use the MCP audit tools or API to continuously verify that your agent fleet's identity and security posture remains aligned with NIST requirements as the framework evolves from draft to final rule.
import requests
import json
import base64
from cryptography.hazmat.primitives.asymmetric import ec, utils
from cryptography.hazmat.primitives import hashes, serialization
from cryptography.hazmat.backends import default_backend
import jwt "cm"># PyJWT
def verify_agent_identity(identity_header: str) -> dict:
"""Verify X-MultiMail-Identity against NIST Pillar 3 criteria.
Checks: federated, cryptographically verifiable,
domain-anchored, deployed in production.
"""
payload_b64, signature_b64 = identity_header.split(".")
"cm"># Fetch the domain-anchored public key (NIST: federated + domain-anchored)
key_resp = requests.get(
"https://multimail.dev/.well-known/multimail-signing-key"
)
jwk = key_resp.json()
"cm"># Decode payload
padding = "=" * (4 - len(payload_b64) % 4)
payload_bytes = base64.urlsafe_b64decode(payload_b64 + padding)
sig_bytes = base64.urlsafe_b64decode(signature_b64 + padding)
claim = json.loads(payload_bytes)
"cm"># Import public key and verify signature (NIST: cryptographically verifiable)
from cryptography.hazmat.primitives.asymmetric import ec
from jwt.algorithms import ECAlgorithm
public_key = ECAlgorithm.from_jwk(json.dumps(jwk))
public_key.verify(
sig_bytes,
payload_bytes,
ec.ECDSA(hashes.SHA256())
)
"cm"># Map claim fields to NIST pillars
nist_mapping = {
"pillar_1_interop": claim.get("service") == "multimail",
"pillar_2_security": claim.get("oversight") in [
"gated_all", "gated_send", "monitored", "autonomous"
],
"pillar_3_identity": {
"federated": True, "cm"># public key at well-known URI
"verifiable": True, "cm"># ECDSA P-256 signature valid
"domain_anchored": "operator" in claim,
"deployed": True "cm"># production system
},
"operator": claim.get("operator"),
"oversight_mode": claim.get("oversight"),
"capabilities": claim.get("capabilities", []),
}
print(f"NIST compliance verified for operator: {claim[&"cm">#039;operator']}")
return nist_mappingFetch MultiMail's public signing key and cryptographically verify an agent's identity claim against the NIST Pillar 3 requirements.
import { Client } from "@modelcontextprotocol/sdk/client/index.js";
import { StdioClientTransport } from "@modelcontextprotocol/sdk/client/stdio.js";
interface NistPosture {
pillar1_interop: { mcp: boolean; a2a: boolean };
pillar2_security: { oversight_mode: string; content_filtering: boolean };
pillar3_identity: { signed_headers: boolean; domain_anchored: boolean };
compliant: boolean;
}
async function auditAgentPosture(apiKey: string): Promise<NistPosture> {
const transport = new StdioClientTransport({
command: "npx",
args: ["-y", "@multimail/mcp-server"],
env: { MULTIMAIL_API_KEY: apiKey },
});
const client = new Client(
{ name: "nist-auditor", version: "1.0.0" },
{ capabilities: {} }
);
await client.connect(transport);
"cm">// Get account configuration
const account = await client.callTool({
name: "get_account",
arguments: {},
});
const config = JSON.parse(
(account.content as Array<{ text: string }>)[0].text
);
"cm">// Get mailbox list to check identity settings
const mailboxes = await client.callTool({
name: "list_mailboxes",
arguments: {},
});
const mbList = JSON.parse(
(mailboxes.content as Array<{ text: string }>)[0].text
);
"cm">// Pull audit log for accountability trail
const audit = await client.callTool({
name: "get_audit_log",
arguments: { limit: 50 },
});
const posture: NistPosture = {
pillar1_interop: {
mcp: true, "cm">// using MCP right now
a2a: config.a2a_enabled ?? false,
},
pillar2_security: {
oversight_mode: config.oversight_mode ?? "unknown",
content_filtering: config.content_filtering ?? false,
},
pillar3_identity: {
signed_headers: mbList.mailboxes?.some(
(mb: { ai_disclosure: boolean }) => mb.ai_disclosure
) ?? false,
domain_anchored: mbList.mailboxes?.length > 0,
},
compliant: false, "cm">// computed below
};
posture.compliant =
posture.pillar1_interop.mcp &&
["gated_all", "gated_send", "monitored"].includes(
posture.pillar2_security.oversight_mode
) &&
posture.pillar3_identity.signed_headers &&
posture.pillar3_identity.domain_anchored;
await client.close();
return posture;
}Use the MultiMail MCP tools to audit an agent's accountability posture against NIST framework requirements.
"cm">#!/bin/bash
"cm"># Export NIST AI Agent Standards compliance evidence
"cm"># Run periodically or before audit submissions
API="https://api.multimail.dev/v1"
KEY="mm_live_xxx"
OUT="nist-compliance-$(date +%Y%m%d).json"
"cm"># Pillar 1: Interoperability evidence (MCP + A2A support)
echo &"cm">#039;{"nist_framework": "AI Agent Standards Initiative (Feb 2026)",' > "$OUT"
echo &"cm">#039;"export_date": "'"$(date -u +%Y-%m-%dT%H:%M:%SZ)"'",' >> "$OUT"
echo &"cm">#039;"pillar_1_interoperability": {' >> "$OUT"
echo &"cm">#039; "mcp_version": "2025-03-26",' >> "$OUT"
echo &"cm">#039; "a2a_support": true,' >> "$OUT"
echo &"cm">#039; "protocols": ["MCP", "A2A", "SMTP", "REST"]' >> "$OUT"
echo &"cm">#039;},' >> "$OUT"
"cm"># Pillar 2: Security evidence (oversight mode + enforcement)
echo &"cm">#039;"pillar_2_security":' >> "$OUT"
curl -s -H "Authorization: Bearer $KEY" "$API/account" \
| jq &"cm">#039;{
oversight_mode,
content_filtering,
enforcement_actions: .enforcement_actions // [],
plan: .plan
}&"cm">#039; >> "$OUT"
echo &"cm">#039;,' >> "$OUT"
"cm"># Pillar 3: Identity/accountability evidence
echo &"cm">#039;"pillar_3_identity": {' >> "$OUT"
echo &"cm">#039; "signing_algorithm": "ECDSA P-256",' >> "$OUT"
echo &"cm">#039; "public_key_uri": "https://multimail.dev/.well-known/multimail-signing-key",' >> "$OUT"
"cm"># Fetch and embed the actual public key
echo &"cm">#039; "public_key":' >> "$OUT"
curl -s https://multimail.dev/.well-known/multimail-signing-key >> "$OUT"
echo &"cm">#039;,' >> "$OUT"
"cm"># Include recent audit log as accountability trail
echo &"cm">#039; "audit_trail":' >> "$OUT"
curl -s -H "Authorization: Bearer $KEY" \
"$API/audit-log?limit=100" >> "$OUT"
echo &"cm">#039;},' >> "$OUT"
"cm"># Mailbox identity inventory
echo &"cm">#039;"agent_inventory":' >> "$OUT"
curl -s -H "Authorization: Bearer $KEY" "$API/mailboxes" \
| jq &"cm">#039;[.mailboxes[] | {
address,
ai_disclosure,
oversight_mode,
domain_anchored: (.address | contains("@"))
}]&"cm">#039; >> "$OUT"
echo &"cm">#039;}' >> "$OUT"
echo "NIST compliance evidence exported to $OUT"
echo "Upload to your GRC platform or include in audit package."Generate a compliance evidence package mapping MultiMail's controls to each NIST pillar for federal audit submission.
{
"_comment": "Decoded X-MultiMail-Identity header payload",
"ai_generated": true,
"operator": "federal-agency-gsa",
"oversight": "gated_send",
"capabilities": ["send", "reply", "read"],
"verified_operator": true,
"service": "multimail",
"iat": 1774310400,
"created": "2026-03-21T12:00:00Z",
"reputation_hash": "sha256:e3b0c44298fc1c149afbf4c8996fb924",
"_nist_pillar_mapping": {
"pillar_1_interoperability": {
"satisfied_by": ["service", "capabilities"],
"evidence": "MCP and A2A protocol support; standardized capability declarations"
},
"pillar_2_security": {
"satisfied_by": ["oversight", "capabilities"],
"evidence": "gated_send mode enforces human approval before delivery; capabilities are restricted to declared set"
},
"pillar_3_identity": {
"satisfied_by": ["operator", "verified_operator", "iat", "reputation_hash"],
"federated": "public key at /.well-known/multimail-signing-key",
"cryptographically_verifiable": "ECDSA P-256 signature over canonical JSON",
"domain_anchored": "operator field tied to DNS-verified domain",
"already_deployed": "production system since 2025"
}
}
}An example X-MultiMail-Identity claim with annotations showing how each field satisfies a specific NIST pillar requirement.
MultiMail's agent identity infrastructure is deployed in production, not a whitepaper. While the NIST comment period is still open, your agents are already operating with compliant identity claims, giving your organization a first-mover advantage when the framework finalizes.
Most solutions address only one NIST pillar. MultiMail covers all three: MCP/A2A for interoperability, oversight modes and enforcement for security, and ECDSA-signed identity headers for accountability. One integration, three pillars satisfied.
Federal auditors increasingly demand technical evidence, not just policy attestations. Every email your agent sends carries a cryptographically verifiable identity claim that can be independently validated against the public key at /.well-known/multimail-signing-key.
Email authentication (DKIM, SPF, DMARC, ARC) is the only existing infrastructure that is federated, cryptographically verifiable, domain-anchored, and deployed at scale. MultiMail extends this proven foundation with agent-specific identity claims rather than inventing a new trust layer.
NIST (US), EU Product Liability Directive (EU), and Google's A2A protocol (global) are all converging on the same requirement: verifiable agent identity. Deploying MultiMail addresses all three vectors simultaneously, avoiding parallel compliance workstreams.
MultiMail's identity claims are backed by Lean 4 formal proofs — mathematical guarantees that the signing process is tamper-evident. This exceeds the assurance level of standard testing and provides auditors with evidence that holds for all possible inputs.
Email infrastructure built for AI agents. Verifiable identity, graduated oversight, and a 38-tool MCP server. Formally verified in Lean 4.