Saturday, March 21, 2026
HomeHealthcareId is the Battleground

Id is the Battleground

Half 2 in our collection on workload safety covers why understanding “who” and “what” behind each motion in your atmosphere is turning into probably the most pressing — and least solved — downside in enterprise safety

In Half 1 of this collection, we reached three conclusions: The battlefield has shifted to cloud-native, container-aware, AI-accelerated offensive instruments — VoidLink being probably the most superior instance — particularly engineered for the Kubernetes environments; most safety organizations are functionally blind to this atmosphere; and shutting that hole requires runtime safety on the kernel degree.

However we left one essential thread underdeveloped: id.

We known as id “the connective tissue” between runtime detection and operational response. Id is turning into the management aircraft for safety, the layer that determines whether or not an alert is actionable, whether or not a workload is permitted, and whether or not your group can reply probably the most primary forensic query after an incident: Who did this, and what might they attain?

Half 1 confirmed that the workloads are the place the worth is, and the adversaries have seen.

Half 2 is concerning the uncomfortable actuality that our id methods are unprepared for what’s already right here.

Each main assault examined in Half 1 was, at its core, an id downside.

VoidLink’s major goal is harvesting credentials, cloud entry keys, API tokens, and developer secrets and techniques, as a result of stolen identities unlock every part else. ShadowRay 2.0 succeeded as a result of the AI framework it exploited had no authentication at all. LangFlow saved entry credentials for each service it linked to; one breach handed attackers what researchers known as a “grasp key” to every part it touched.

The sample throughout all of those: attackers aren’t breaking in. They’re logging in. And more and more, the credentials they’re utilizing don’t belong to folks, they belong to machines.

Machine identities now outnumber human identities 82-to-1 within the common enterprise, in response to Rubrik Zero Labs. They’re the silent plumbing of contemporary infrastructure, created informally, not often rotated, and ruled by nobody particularly.

Now add AI brokers. In contrast to conventional automation, AI brokers make choices, work together with methods, entry knowledge, and more and more delegate duties to different brokers, autonomously. Gartner initiatives a 3rd of enterprise functions will embrace this type of autonomous AI by 2028.

A latest Cloud Safety Alliance survey discovered that 44% of organizations are authenticating their AI brokers with static API keys, the digital equal of a everlasting, unmonitored grasp key. Solely 28% can hint an agent’s actions again to the human who approved it. And practically 80% can not inform you, proper now, what their deployed AI brokers are doing or who is accountable for them.

Each one expands the potential injury of a safety breach, and our id methods weren’t constructed for this.

The safety business’s reply to machine id is SPIFFE, and SPIRE, a normal that provides each workload a cryptographic id card. Quite than static passwords or API keys that may be stolen, every workload receives a short-lived, robotically rotating credential that proves it’s primarily based on verified attributes of its atmosphere. 

Credentials that rotate robotically in minutes develop into nugatory to malware like VoidLink, which relies on stealing long-lived secrets and techniques. Providers that confirm one another’s id earlier than speaking make it far tougher for attackers to maneuver laterally by way of your atmosphere. And when each workload carries a verifiable id, safety alerts develop into instantly attributable;  which service acted, who owns it, and what it ought to have been doing. 

These id methods had been designed for conventional software program companies, functions that behave predictably and identically throughout each working copy. AI brokers are basically totally different. 

As we speak’s workload id methods usually assign the identical id to each copy of an software when cases are functionally an identical. If in case you have twenty cases of a buying and selling agent or a customer support agent working concurrently, they usually share one id as a result of they’re handled as interchangeable replicas of the identical service. This works when each copy does the identical factor. It doesn’t work when every agent is making impartial choices primarily based on totally different inputs and totally different contexts. 

When a type of twenty brokers takes an unauthorized motion, you have to know which one did it and why. Shared id can’t inform you that. You can’t revoke entry for one agent with out shutting down all twenty. You can’t write safety insurance policies that account for every agent’s totally different habits. And also you can’t fulfill the compliance requirement to hint each motion to a selected, accountable entity. 

This creates gaps: You can’t revoke a single agent with out affecting your entire service, safety insurance policies can’t differentiate between brokers with totally different behaviors, and auditing struggles to hint actions to the accountable decision-maker. 

Requirements might ultimately help finer-grained agent identities, however managing hundreds of thousands of short-lived, unpredictable identities and defining insurance policies for them stays an open problem. 

There’s a second id problem particular to AI brokers: delegation

While you ask an AI agent to behave in your behalf, the agent wants to hold your authority into the methods it accesses. However how a lot authority? For the way lengthy? With what constraints? And when that agent delegates a part of its job to a second agent, which delegates a third, who’s accountable at every step? Requirements our bodies are growing options, however they’re drafts, not completed frameworks.  

Three questions stay open:

  • Who’s liable when an agent chain goes fallacious? For those who authorize an agent that spawns a sub-agent that takes an unauthorized motion, is the accountability yours, the agent developer? No framework offers a constant reply.
  • What does “consent” imply for agent delegation? While you authorize an agent to “deal with your calendar,” does that embrace canceling conferences and sharing your availability with exterior events? Making delegation scopes exact sufficient for governance with out making them so granular they’re unusable is an unsolved design downside.
  • How do you implement boundaries on an entity whose actions are unpredictable? Conventional safety assumes you possibly can enumerate what a system must do and prohibit it. Brokers cause about what to do at runtime. Limiting them too tightly breaks performance; too loosely creates threat. The best stability hasn’t been discovered.

In Half 1, we shared that Hypershield offers the identical ground-truth visibility in containerized environments that safety groups have lengthy had on endpoints. That’s important, however alone, solely solutions what is occurring. Id solutions who is behind it, and for brokers, we have to know why it’s occurring. That’s what turns an alert into an actionable response. 

With out id, a Hypershield alert tells you: “One thing made a suspicious community connection.” With workload id, the identical alert tells you: “Your inference API service, owned by the info science workforce, deployed by way of the v2.4 launch pipeline, performing on delegated authority from a selected person, initiated an outbound connection that violates its approved communication coverage.”  

Your workforce is aware of instantly what occurred, who’s accountable, and precisely the place to focus their response, particularly when threats like VoidLink function at AI-accelerated velocity. 

The inspiration exists: workload id requirements like SPIFFE for machine authentication, established protocols like OAuth2 for human delegation, and kernel-level runtime safety like Hypershield for behavioral remark. What’s lacking is the mixing layer that connects these items for a world the place autonomous AI brokers function throughout belief boundaries at machine velocity. 

This can be a zero belief downside. The rules enterprises have adopted for customers and gadgets should now prolong to workloads and AI brokers. Cisco’s personal State of AI Safety 2026 report underscores the urgency: Whereas most organizations plan to deploy agentic AI into enterprise capabilities, solely 29% report being ready to safe these deployments. That readiness hole is a defining safety problem.  

Closing it requires a platform the place id, runtime safety, networking, and observability share context and might implement coverage collectively. That’s the structure Cisco is constructing towards. These are the sensible steps each group ought to take:

  • Make stolen credentials nugatory. Substitute long-lived static secrets and techniques with short-lived, robotically rotating workload identities. Cisco Id Intelligence, powered by Duo, enforces steady verification throughout customers, workloads, and brokers, eliminating the persistent secrets and techniques that assaults like VoidLink are designed to reap.
  • Give each detection its id context. Realizing a workload behaved anomalously will not be sufficient. Safety groups must know which workload, which proprietor, what it was approved to achieve, and what the blast radius is. Common Zero Belief Community Entry connects id to entry choices in actual time, so each sign carries the context wanted to behave decisively.
  • Carry AI brokers inside your governance mannequin. Each agent working in your atmosphere must be recognized, scoped, and approved earlier than it acts — not found after an incident. Common ZTNA’s automated agent discovery, delegated authorization, and native MCP help make agent id a first-class safety object fairly than an operational blind spot.
  • Construct for convergence, not protection. Layering level instruments creates the phantasm of management. The challenges of steady authorization, delegation, and behavioral attestation require a platform the place each functionality shares context. Cisco Safe Entry and AI Protection are designed to do that work — cloud-delivered, context-aware, and constructed to detect and cease malicious agentic workflows earlier than injury is finished.

In Half 1, we mentioned the battlefield shifted to workloads. Right here in Half 2: id is the way you combat on that battlefield. And in a world the place AI brokers have gotten a brand new class of digital workforce, zero belief isn’t only a safety framework, it’s the essential framework that protects and defends.


We’d love to listen to what you assume! Ask a query and keep linked with Cisco Safety on social media.

Cisco Safety Social Media

LinkedIn
Fb
Instagram


RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments