The agentic identity crisis

With millions of AI agents being deployed, how can security teams maintain oversight and governance?

The text "The agentic identity crisis" against a silhouette of a person formed from question marks on a purple background. The words "identity crisis" are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.
(Image credit: Future)

Identity controls in the enterprise have only become more complicated over the last few years.

Initially, the focus was on IoT devices, which were exploding in the enterprise environment. But recent years have brought an onslaught of AI tools and AI agents, all of which come with security and governance complications.

How can business leaders get a grip on the adoption of AI agents, particularly as these tools begin to communicate with one another and with third-party enterprise tools?

In this episode, Rory speaks to Shiven Ramji, president, Auth0 at Okta, to discuss the future of identity, security and governance in the face of AI agents.

Highlights

"An agent can do lots of things on demand, so we all know that there are a lot of benefits and power with this technology. But my biggest concern is that, I think from a security privacy perspective, we need to make sure that these agents are deployed with utmost care and making sure all the principles that we use today from a security standpoint are applied and ensure that these agents don't do things that we don't want them to do."

"Agents can call other agents or other LLMs, agents can access file systems, agents can query databases. agents can view your other internal applications, can query your internal knowledge management systems, so on and so forth. So you really have to make sure that you have control over all of these resources internally and so, I think the second issue here that's getting amplified in a pretty significant way, is a lot of CIOs and CISOs are concerned that if you have these rogue agents running around in your environment, you're not sure that their internal permissions model is set up in a way to handle the use cases that are potentially being executed by agents."

"My bet will be a lot of these protocols will be part of some of these large, open source ecosystems and bodies, so that they have their own governance, and people can contribute and and then I think everybody is motivated to make sure that there are standard ways through which agents are communicating with each other."

Footnotes

Subscribe 

Rory Bathgate
Features and Multimedia Editor

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.

In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.