For decades, regulatory frameworks assumed something that is no longer maintained today: that the main actors in business processes are people. The standards were built by thinking of users with a clear role, identifiable responsible and human approval chains that could be audited and questioned. This logic lies in laws and standards such as the Sarbanes-Oxley Act (SOX), the General Data Protection Regulation (GDPR), the PCI DSS requirements and HIPAA obligations. But the arrival of artificial intelligence agents that not only help, but execute actions within critical systems, is forcing that basic assumption to be reconsidered.
The IA-based agents are no longer mere copilots: they act within flows that affect accounting, customer data processing, medical records, payment transactions and even identity and access decisions. They can enrich records, classify sensitive information, solve exceptions, activate processes in an ERP or consult databases at machine speed. This behaviour creates new risks to compliance because it changes the nature of the "who" that makes an action and, thus, the traceability and explexability required by auditors and regulators.

The IA models do not work as determinist processes that you can validate quarterly and forget until the next audit. Your decision-making is probabilistic, context-dependent and can vary by changes in prompts, model updates, new recovery sources or external plugins. A control that today adequately limits a process can stop doing so tomorrow without anyone having "touched" it in a conventional way. And regulators do not accept that a system "generally" meets: they call for continuous evidence that operations are maintained within the agreed limits. For those who lead security, this is an additional burden that does not always fit traditional organizational schemes.
In the area of finance, for example, IA tools can write seats, reconcile accounts or propose approvals. If an agent has cross-access between finance and IT systems, segregation of functions - a pillar of SOX - can collapse without clear signals. Here the difficulty is not only that a transaction appears in the records, but that the records explain in sufficient detail why it was produced. The auditors can see the action, but not always the reasoning behind it, and that complicates the defence of the integrity of financial reports. To understand the regulation of SOX it is appropriate to refer to official sources such as Securities and Exchange Commission ( SOX documentation).
In the area of privacy, the General Data Protection Regulation requires that access and processing of personal data be restricted to the authorized purposes. An agent who inserts PII into a prompt, sends information to external services or records sensitive data in unapproved warehouses may constitute an instant infringement, even if there is no external breach. The European framework on data protection and its practical interpretation are key to understanding these obligations; GDPR.eu they explain the principles that should guide these decisions.
The environments that handle card data require strict segmentation according to PCI DSS. If an agent consults or transforms payment data and these results end up in systems outside the card holders' data environment, the compliance chain is broken and the organization may be subject to sanctions. The Payment Card Industry Security Standards Council it maintains the guidelines on how such information should be protected.
In health, the protection of clinical information (PHI) requires not only confidentiality but also detailed audit of access and disclosure. When an agent sums up medical notes or automates admission flows by playing PHI, it is essential to be able to demonstrate who agreed to what, when and why. The Civil Rights Office of the U.S. Department of Health. UU offers material on low obligations HIPAA.
Against this background, operational and compliance responsibility is moving to teams that manage identities, access and system governance: traditionally, a field of security. The problem is aggravated when agent implementations seek comfort and speed: wide permits, shared credentials, diffuse owners and long-term tokens. It is precisely the practices that the organizations have tried to eradicate and which now reappear "in the name of innovation," weakening controls that the auditors expect to see in operation.
That's why many experts recommend treating IA agents as non-human identities that require the same safeguards as a privileged user. Questions such as "on behalf of who acts the agent?," "what permissions do you have?," "how do you rotate your credentials?" and "are there continuous monitoring that detects deviations in your behavior?" are no longer rhetorical to become operational requirements. When an agent's performance is out of control, the symptoms are not only technical: they are governance failures that end up in audits, regulatory questions and possible executive responsibilities. A journalistic analysis of the growing expectation of the responsibility of the CISO addresses it in specialized publications, for example in Infosecurity Magazine.
What does this mean in practice for security teams? It involves, inter alia, ensuring clear ownership of each agent, applying the principle of minimum privilege without unnecessary exceptions, using managed and short-life credentials, implementing records that not only show actions but also context and decision-making origin, and maintaining change controls that document updates of prompts, models and connectors. The technical challenge goes hand in hand with an organizational challenge: to define responsible, review processes and fast ways to contain agents that start to deviate.
It is also critical to incorporate risk management frameworks specific to IA that emphasize continuous assessment and traceability. The National Institute of Standards and Technology (NIST) has published material that helps to structure this approach and align practices with technological risk management ( NIST AI Risk Management Framework), and European and national bodies are already working on guidelines to regulate the responsible use of IA.
The conclusion for security officials is clear: it is not enough to protect infrastructure; they must now ensure that regulated flows remain defensible when the actors who implement them are intelligent systems. In an incident, the decisive question for a regulator or auditor will not only be "what failed," but "could the organization demonstrate that it maintained control over that non-human actor at all times?." If the evidence is incomplete, the explanation "the IA did it" will no longer be acceptable.

The transformation to environments where automated agents participate in sensitive processes is unstoppable. The answer is not to give up automation, but to raise governance at the same speed as these technologies are deployed: to identify and audit no-human identities, to verify real-time permits and access, to document behavioural changes and to keep records that will explain decisions to third parties. Only in this way can companies take advantage of the efficiency of the IA without opening regulatory vulnerabilities.
For those who want to deepen how to articulate this comprehensive defence, there are specific guides and tools and suppliers that offer identity management and agent audit solutions. The technical and legal debate on responsibility and best practices is in full development and it is appropriate to follow official sources and frameworks as they appear. Among them, in addition to the links mentioned above, it is advisable to consult the public documentation and recommendations of specialized regulatory bodies and research centres.
In short, innovation drives huge possibilities, but it also requires rethinking how we demonstrate compliance in a world where actors can be machines. For high management and security teams, the question to answer today is not whether the IA will transform processes, but how to maintain governance and accountability when machines operate in systems that affect financial integrity, privacy, payment security and health confidentiality.
Related
More news on the same subject.

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

malicious VS Code extensions: the attack that exposed 3,800 internal repositories
GitHub has confirmed that a device of an employee engaged by a malicious extension of Visual Studio Code allowed the exfiltration of hundreds or thousands of internal repositori...

Grafana exposes the new face of security: attacks on the supply chain that exposed tokens, internal repositories and npm dependencies
Grafana Labs confirmed on May 19, 2026 that the intrusion detected at the beginning of the month did not compromise the production systems or the operation of Grafana Cloud, but...

Fox Temper exposes the fragility of digital signature in the cloud
Microsoft's disclosure of the operation of "malware-signing-as-a-service" known as Fox Temper replaces in the center the most critical vulnerability of the modern software ecosy...

It is no longer how many CVE there are, it is the concentration of vulnerabilities that facilitates the escalation of privileges in Azure, Office and Windows Server
Data from the 2026 Microsoft Vulnerabilities Report they reveal an uncomfortable truth for security equipment: it is not the total volume of CVE that determines the real risk of...