We are at the forefront of a transformation that is not simply an improvement of conversational attendees: so-called IA agents are self-contained systems that plan, decide and perform tasks on their own. In practice, that means that they can write code, move data, run transactions, supply infrastructure and serve customers without constant human intervention, and they will do so with the speed and continuity that only machines can offer. This leap offers enormous advantages for companies, but it also poses new and far-reaching risks if safety is not addressed from the root.
So far many organizations have relied on "guardian" type controls: prompt filters, output monitoring and behavioral rules. It is an understandable approach, because it tries to minimize damage without blocking innovation. However, these mechanisms act too late: once an agent has credentials and connectivity, a single committed credential or a logic error can cause mass leaks, destructive actions or cascade failures between interconnected systems. The non-determinable and adaptable nature of these agents makes circumventing rules a question of when, not of whether.

The answer is not to strengthen the rangers, but to rethink the control plane by focusing security on the identity of the agents. Treating each agent as a digital identity with its own life cycle, permits and responsible transforms the safety from reactive to preventive. On this idea there are frameworks and recommendations that make sense in this context: the NIST has begun to outline risk management frameworks for IA that insist on governance and traceability, and the Zero Trust principles applied to the world of machines reinforce that confidence should not be implicit (see more on NIST AI Risk Management and NIST SP 800-207 on Zero Trust).
In practice, this requires that each agent cease to be "an experiment" and become a managed entity: there must be a responsible person or equipment, robust authentication mechanisms, explicit permissions and a continuous record of its activity. The management of identities and accesses designed for human users is not enough: agents create and rotate credentials at machine speed and tend to multiply identities (tokens API, service accounts, cloud roles, OAuth concessions). The bibliography and the guides on digital identity show that good authentication and life cycle practices - such as those made by the NIST in its identity recommendations - are fundamental to not lose control ( NIST SP 800-63: Digital Identity Guidelines).
Another common problem is the so-called "Shadow AI," a modern version of Shadow IT: teams or developers launch agents that talk to critical systems and no one in security sees it. To prevent unmanaged identities from being automatically trusted for having valid credentials, it is essential to continuously discover non-human identities and map which agents access which resources. Without visibility there is no possibility of implementing coherent policies; security collapses if what acts autonomously remains invisible.
But it is not enough to define static permissions: IA agents operate by targets, and two agents with the same privileges can behave very differently according to their purpose. That is why security must incorporate the notion of intention: what an agent is trying to achieve, what actions he needs to achieve that objective and what actions are beyond its legitimate reach. In practice this means designing permissions that reflect the operative purpose of the agent and not simply inheriting the credentials of a privileged human. In simple terms, an agent in charge of summarizing support tickets should not have the permits to export the full customer database, and an infrastructure optimization agent should not be able to modify IAM policies without specific controls.

The full life cycle must also be considered: incidents rarely occur at the moment of creation; they happen when access is accumulated, property is diluted, credentials persist and functions change without revision. With IA agents this cycle is accelerated and intermediate states occur in hours or days instead of months. It is therefore necessary to apply continuous governance: to review property, to audit permits, to rotate secrets and to have clear criteria for removing agents or to review their alignment with the original purpose. Without these processes, the risk is made up in silence until it is too late.
Reformulating security around agent identities does not mean stopping innovation; on the contrary, it allows to deploy agents to scale while maintaining control and speed. Companies that integrate agent identity management, continuous visibility, intention-based access control and life-cycle governance will be placed to the advantage: they can take advantage of the power of autonomy without being exposed to reputational, financial or regulatory losses. For those looking for complementary frameworks and practices, there are useful resources that address APIs security, identity protection and the secure design of connected systems, for example OWASP in relation to APIs security ( OWASP API Security) and good practice guides on cloud identity management and access published by organizations such as the Center for Internet Security ( CIS Controls).
In short, the central lesson is that the autonomy of machines requires a paradigm shift: from mitigating unwanted behaviors to controlling who they are and what these automated actors can do. Implementing identity and governance from design is not a luxury, it is the condition for the wave of IA agents to drive business transformation without making it an uncontrollable source of risk.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

Mini Shai-Hulud: the attack that turned the dependencies into mass intrusion vectors
Summary of the incident: GitHub investigates unauthorized access to internal repositories after the actor known as TeamPCP put the alleged source code and internal platform orga...

Security Alert: CVE-2026-45829 exposes ChromaDB to remote code execution without authentication
A critical failure in ChromaDB Python API - the popular vector base used for recovery during LLM inference - allows non-authenticated attackers to run arbitrary code on exposed ...