The massive arrival of IA agents in corporate environments does not simply create a new category of "users"; it exposes a structural failure in how companies delegate authority. An IA agent acts because someone - a human, a service account, a bot - transfers power. If this origin is not well observed and governed, the agent merely amplifies hidden privileges and execution routes out of control. It was not enough to give the agent nominal permits: the source that that delegation had signed had to be checked.
Today there are managed identities with a vast "dark matter" of embossed credentials, unmanaged service accounts, APIs with ad hoc authentication and identity logic distributed between applications. This fragmentation makes any attempt at governance over IA agents a game of appearances, because the agent inherits a broken authority model. The question that policy should guide is not only "what the agent can access," but "what authority they are delegating to, who delegates it, in what context and with what scope".

The sequence matters: before connecting automated agents to critical systems, organizations must close the circle over the traditional identities that activate them. This involves discovering and mapping human and non-human identities through applications and environments, identifying embossed credentials, removing unnecessary access and consolidating authentication under verifiable controls. Guide to good practice in identity, such as the NIST recommendations on Zero Trust and identity management, provide technical frameworks that help guide this work ( NIST SP 800-207, NIST SP 800-63-3).
Once the "source" is cleaner and more visible, the next step is to transform observability into dynamic control. It is not enough to register: it is necessary continuous telemetry that feeds an engine of authority capable of evaluating the delegate, the intention, the path of application and the operational scope in real time. Such an approach allows for more thin decisions than "allowing or denying": for example, allowing only recommendations, restricting available tools, imposing human reviews, or issuing ephemeral credentials with immediate expiry when the risk of the delegation is high.
In practice this requires technical and organizational changes. Technically, it is necessary to remove embedded secrets, apply strong and multiple factor authentication, migrate to ephemeral credentials and access policies based on attributes (ABAC) and context, rather than overtake rigid roles. Secret detection tools, automatic rotation and service account management are essential. Microsoft documents how "identity dispersion" increases risk and why consolidation and visibility are mandatory previous steps ( Identity sprawl - Microsoft).

In the organizational sphere, governance should incorporate a position assessment of the delegate as an authorisation criterion. A worker with excessive access or risky behaviour, or a service account with misunderstood privileges, should not grant the same authority to an agent as a well-supervised actor. This requires the integration of security, operations and business equipment to define policies, approval flows and real-time risk metrics. It is also key to prepare response and audit plans that assume that automated delegation chains can fail or be abused.
The regulatory and compliance implications also change. Auditing actions of IA agents requires tracking not only the final identity that the action carried out, but the full chain of delegation: who authorized, in what context and with what mitigation control. The traditional controls of AMI give partial visibility; the solution is a dynamic layer of delegation that turns continuous observability into enforceable and verifiable policies.
For teams seeking to apply these principles, the recommended path is simple in form but demanding in execution: first to discover and remedy dark identity; second to implement continuous observability of delegates and flows; third to implement contextual clearance controls and ephemeral credentials; and fourth to operate a feedback loop between telemetry, policies and mediation. It is not a magic recipe, but it is the only way to reduce the radius of damage that IA agents can amplify if they receive authority from ungoverned sources. The time to start is now: automation can scale up both efficiency and errors, and only a conscious delegation strategy ensures that it is more appropriate than the latter.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

Mini Shai-Hulud: the attack that turned the dependencies into mass intrusion vectors
Summary of the incident: GitHub investigates unauthorized access to internal repositories after the actor known as TeamPCP put the alleged source code and internal platform orga...

Security Alert: CVE-2026-45829 exposes ChromaDB to remote code execution without authentication
A critical failure in ChromaDB Python API - the popular vector base used for recovery during LLM inference - allows non-authenticated attackers to run arbitrary code on exposed ...