Article Details

Scrape Timestamp (UTC): 2025-07-15 11:03:17.127

Source: https://thehackernews.com/2025/07/securing-agentic-ai-how-to-protect.html

Original Article Text

Click to Toggle View

Securing Agentic AI: How to Protect the Invisible Identity Access. AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI agent spins up a workflow, it has to authenticate somewhere; often with a high-privilege API key, OAuth token, or service account that defenders can't easily see. These "invisible" non-human identities (NHIs) now outnumber human accounts in most cloud environments, and they have become one of the ripest targets for attackers. Astrix's Field CTO Jonathan Sander put it bluntly in a recent Hacker News webinar: "One dangerous habit we've had for a long time is trusting application logic to act as the guardrails. That doesn't work when your AI agent is powered by LLMs that don't stop and think when they're about to do something wrong. They just do it." Why AI Agents Redefine Identity Risk Treat AI Agents Like First-Class (Non-Human) Users Successful security programs already apply "human-grade" controls like birth, life, and retirement to service accounts and machine credentials. Extending the same discipline to AI agents delivers quick wins without blocking business innovation. Secure AI Agent Access Enterprises shouldn't have to choose between security and agility. Astrix makes it easy to protect innovation without slowing it down, delivering all essential controls in one intuitive platform: 1. Discovery and Governance Automatically discover and map all AI agents, including external and homegrown agents, with context into their associated NHIs, permissions, owners, and accessed environments. Prioritize remediation efforts based on automated risk scoring based on agent exposure levels and configuration weaknesses. 2. Lifecycle management Manage AI agents and the NHIs they rely on from provisioning to decommissioning through automated ownership, policy enforcement, and streamlined remediation processes, without the manual overhead. 3. Threat detection & response Continuously monitor AI agent activity to detect deviations, out-of-scope actions, and abnormal behaviors, while automating remediation with real-time alerts, workflows, and investigation guides. The Instant Impact: From Risk to ROI in 30 Days Within the first month of deploying Astrix, our customers consistently report three transformative business wins within the first month of deployment: Automated discovery and a single source of truth for every AI agent, NHI, and secret reveal unauthorized third-party connections, over-entitled tokens, and policy violations the moment they appear. Short-lived, least-privileged identities prevent credential sprawl before it starts. "Astrix gave us full visibility into high-risk NHIs and helped us take action without slowing down the business." - Albert Attias, Senior Director at Workday. Read Workday's success story here. Meet compliance requirements with scoped permissions, time-boxed access, and per-agent audit trails. Events are stamped at creation, giving security teams instant proof of ownership for regulatory frameworks such as NIST, PCI, and SOX, turning board-ready reports into a click-through exercise. "With Astrix, we gained visibility into over 900 non-human identities and automated ownership tracking, making audit prep a non-issue" - Brandon Wagner, Head of Information Security at Mercury. Read Mercury's success story here. Automated remediation enables engineers to integrate new AI workflows without waiting on manual reviews, while security gains real-time alerts for any deviation from policy. The result: faster releases, fewer fire drills, and a measurable boost to innovation velocity. "The time to value was much faster than other tools. What could have taken hours or days was compressed significantly with Astrix" - Carl Siva, CISO at Boomi. Read Boomi's success story here. The Bottom Line AI agents unlock historic productivity, yet they also magnify the identity problem security teams have wrestled with for years. By treating every agent as an NHI, applying least privilege from day one, and leaning on automation for continuous enforcement, you can help your business embrace AI safely, instead of cleaning up the breach after attackers exploit a forgotten API key. Ready to see your invisible identities? Visit astrix.security and schedule a live demo to map every AI agent and NHI in minutes.

Daily Brief Summary

CYBERCRIME // Enhancing Security Protocols for AI Agent Authentication

AI agents frequently require authentication through high-privilege API keys, OAuth tokens, or service accounts, posing significant security risks.

Non-human identities (NHIs) now outnumber human accounts in cloud environments, making them attractive targets for attackers.

Successful security strategies for NHIs involve implementing "human-grade" controls across their lifecycle, from creation to retirement.

Astrix's platform offers comprehensive solutions such as automated discovery of AI agents and NHIs, lifecycle management, and threat detection and response.

Initial deployments of Astrix's platform can achieve significant security improvements, including automated discovery of unauthorized access and credential reduction, within the first 30 days.

Companies using Astrix have reported substantial compliance gains and operational efficiencies, leading to faster release cycles and reduced manual workload.

Implementing proactive and automated security measures ensures robust protection for AI agents and NHIs, safeguarding enterprise systems from potential cyber threats.