Bastion speaks open protocols - any ACP-compatible LLM provider, any MCP tool, any OpenTelemetry collector. Governance fits into your stack, not the other way around.
Bastion governs AI agents through open protocols rather than per-provider integrations. Any LLM that speaks ACP, any tool that speaks MCP, and any collector that speaks OpenTelemetry or Prometheus works natively - no vendor lock-in, no adapter code.
Bastion natively speaks ACP over NDJSON/JSON-RPC. Any LLM provider or agent runtime that implements the ACP protocol works with Bastion out of the box - no per-provider integration required.
Agent Protocols
Bastion loads MCP server configurations and exposes MCP-compatible tools to governed agents. Existing MCP tools work without modification through Bastion's native protocol support.
Agent Protocols
Declarative agent definitions in Markdown. Bastion reads AgentsMD files to understand agent identity, capabilities, and authority boundaries within the IRONLAW governance model.
Agent Protocols
Skill definitions in Markdown that describe what an agent can do. Bastion uses SkillsMD to validate that agent actions stay within declared skill boundaries.
Agent Protocols
Bastion integrates with GitHub repositories for source control operations, including remote probing and repository-level governance context.
Source Control & CI/CD
First-class CI/CD support. Bastion check-runs can be installed as required status checks, blocking merges when IRONLAW violations are detected.
Source Control & CI/CD
Bastion supports GitLab repositories for source control operations alongside GitHub.
Source Control & CI/CD
Bastion governance events can be emitted as GitLab CI job artifacts, providing an auditable record of AI-assisted pipeline actions.
Source Control & CI/CD
Azure DevOps pipeline and board integration for governance event routing and principal-level authorization of AI-assisted work items.
Source Control & CI/CD
Bastion exports structured metrics and traces via the OTLP protocol. Enable with BASTION_METRICS_OPENTELEMETRY and point at any OTLP-compatible collector.
Observability
Bastion exposes a /metrics endpoint in Prometheus text format. Enable with BASTION_METRICS_PROMETHEUS for pull-based metric collection.
Observability
Direct Datadog integration for governance event dashboards and authorization failure monitors. Use OpenTelemetry export in the interim.
Observability
Direct PagerDuty alerting for critical IRONLAW violations such as unauthorized principal escalation or audit chain breaks.
Observability
Pre-built Grafana dashboard templates for visualizing agent activity, authorization rates, and governance event volume. Use Prometheus export in the interim.
Observability
Governance audit event forwarding to Splunk for SIEM-level correlation of AI agent activity with your broader security event stream.
Observability
Official Docker images for Bastion components. Compose files available for single-host deployments.
Deployment
Helm charts for Kubernetes deployments with namespace isolation and RBAC-aligned principal resolution.
Deployment
Native AWS deployment support with IAM-based principal identity, CloudWatch audit log routing, and VPC-isolated deployment.
Deployment
Azure support including Entra ID principal resolution, Azure Monitor integration, and AKS deployment manifests.
Deployment
GCP deployment with Cloud Logging integration and Workload Identity Federation for principal attribution in GKE.
Deployment
Bastion governance event exports mapped to Drata evidence collection for SOC 2 and ISO 27001 controls.
Compliance & Audit
Continuous compliance monitoring - surfacing IRONLAW violation rates and audit chain health in your Vanta dashboard.
Compliance & Audit
Don't see what you need?
We add integrations based on customer demand. Let us know what you are using and we will prioritize accordingly.
Need an integration we don't have yet?
We add integrations based on customer demand. Let us know what you need and we'll prioritize accordingly.
Was this page helpful?