AuthZ Agents of Chaos

AuthZ Agents of Chaos

The emergence of agentic AI represents a significant inflection point in computing that requires strategic recalibration of our traditional assumptions of authentication frameworks and RBAC implementations. Whereas a human intuitively knows not to take an action even where permitted to do so, agents optimize for efficiency. As these autonomous systems evolve beyond traditional automation boundaries, over-provisioned access patterns between disparate systems will be exposed aggressively and at-scale. Expecting a period of chaos that will ultimately improve technology safety though not graceful and not without a high operational cost. At times the logical action may not be the best action for the business. Bring on the great reordering, what an exciting time to be alive.

The established security principles that have guided our defense strategies now likely to face new and significant challenges as we integrate autonomous or non-deterministic capabilities. With each technological advancement, we experience a transitional phase where implicit or explicit security boundaries change, testing our security frameworks, and revealing weaknesses in conventional controls.

As it pertains to governance and accountability, a meaningful distinction emerges between human-initiated and agent-driven operations within our platforms and infrastructure. As AI systems increasingly mirror human decision patterns, establishing clear attribution mechanisms becomes essential for effective security investigation and oversight. Adapting current auth systems to support composite identities is a first step in properly attributing agents to their human operators.

It's possible to imagine a world in which organizations may need to develop Autonomous Resource Information Systems (ARIS) that parallel our Human Resource Information Systems—maintaining profiles of autonomous agents that document capabilities, specializations, and operational boundaries. This approach enables the strategic deployment of hybrid human-agent teams while preserving necessary attribution and authorization boundaries. As more work shifts to agents, we will need to consider the full lifecycle management of those entities from instantiation to deprecation.

Key considerations:

  • Authentication systems that facilitate composite identities for human attribution to their agents
  • Comprehensive monitoring frameworks that span workflows and processes beyond the boundaries of single systems
  • Transparency in AI usage and clear accountability structures for autonomous operations

The path forward requires balancing innovation with adaptable and extensible governance frameworks. While presenting significant challenges, agentic AI also offers substantial opportunities to enhance our operational capabilities and security posture through thoughtful governance.

#AgenticAI #CyberSecurity #AIGovernance

Shawnpaul M.

3500 Depauw Blvd Suite 1110, Indianapolis, IN 46268

8mo

or enjoy continuous product marginalization in the biometric space. i'm terrified.

Like
Reply
Graham Neray

Cofounder & CEO at Oso

8mo

Curious what led you to write about this? Starting to talk to customers about this problem at Oso

Raj Krishnamurthy

Engineering Agentic Cybersecurity GRC and Trust Systems

8mo

I think this puts an emphasis on fine grained authorization (example: OpenFGA) to avoid over permissive privileges. This also be paired with autogenerating RBAC based on audit logs of agents usage. Reminds me of the fantastic work from Jordan Liggit on Kubernetes: https://github.com/liggitt/audit2rbac

Manuel Berrueta

Offensive Security Engineer | Red Team

8mo

Thinking out loud here, from an Entra ID perspective you could use an Entra ID App registration for the agent and setting the ownership of that app reg to its human counterpart and setting the permission limitations there. However, to your point that might not be enough as some RBAC rules might be too permissive where an agent might make that non-human and possibly destructive decision that a human may know not to make or the agent possibly finding a priv-esc path to allow them more freedom to expand its capabilities. Thank you for sharing your thoughts.

Gadi Evron

Building a world-class AI security company at Knostic | CISO-in-Residence for AI at Cloud Security Alliance

8mo

Every word. This is why Sounil Yu and I started Knostic. LLMs don’t know how to keep a secret.

To view or add a comment, sign in

More articles by Josh Lemos

  • Given Enough AIs, All Bugs Are Shallow

    We're in the best era ever for finding security vulnerabilities quickly and at scale. Linus' Law, Eric Raymond's famous…

    9 Comments
  • Agents of Order - Agentic Defense

    The AI landscape continues to transform at a blistering pace. Over the past year, I often hypothesized the asymmetric…

    14 Comments
  • AuthZ Agent of Chaos: MCP

    There’s a lot of excitement around agentic AI open protocols such as Model Context Protocol (MCP) and Agent2Agent…

    5 Comments
  • Authorization - The Forgotten Second A

    It seems that everyone in InfoSec is focused on solving three problems: identity, identity, and identity. Its the Who…

    3 Comments
  • Death of Traditional Penetration Testing

    Yes, another $something is dead article. What I mean is the traditional one-size-fits-all cookie-cutter engagement of…

    20 Comments
  • Honeypots - Bringing Stealthy Back

    Deception and passive monitoring have a long history What is new is old: Cuckoo's Egg 2.0 (if you don't know what I'm…

    3 Comments
  • Security Experts Versus the Layperson

    If you are like most technology professionals family and friends come to you for advice on anything tangentially…

    2 Comments
  • Security Program Spring Cleaning - Part 3 of 3

    Now we’ve dusted the bunnies under the furniture, steam cleaned the carpets, and nearly fell asleep reviewing…

    1 Comment
  • Security Program Spring Cleaning - Part 2 of 3

    Last week I kicked off a series of “Spring Cleaning” security tips to freshen up those dusty networks; we moved the…

  • Security Program Spring Cleaning - Part 1 of 3

    The weather is warming and as we reach mid-Spring in North America, it is time when one must ask - is my security…

    3 Comments

Others also viewed

Explore content categories