Page 284 - Cyber Defense eMagazine September 2025
P. 284

For example, within an MCP environment, an AI agent might monitor system usage patterns and, upon
            detecting  performance  degradation,  proactively  open  a  ticket  in  your  ITSM  platform,  scale  out
            infrastructure via your cloud provider’s API, and update an internal dashboard to reflect the change, all
            without human intervention. This kind of automation is powerful; but consider the permissions that were
            granted to facilitate this ability: read production environments logs and metrics; write access to ITSM;
            modify production deployment configurations.

            Now consider that in the rush to implement and utilize, many would simply give free reign to the agent by
            providing their own credentials, or provisioning access through largely over-permissive identities. It is
            increasingly difficult to navigate modern IAM requirements. What’s more concerning is that these agents
            often operate in the background, in bulk, and outside of standard security controls. Their activity is under-
            logged and their behavior remains essentially unmonitored.


            Giving  AI  agents  the  keys  to  the  kingdom  without  visibility  or  guardrails  could  have  severe  security
            consequences. Organizations should treat these identities as high-risk actors, applying least privilege,
            robust logging, and constant oversight to ensure safety and control.



            Coming Next

            AI is moving fast, but if identity isn’t part of the plan, risk moves faster. Security leaders need to know
            where AI is running, what it can access, and who—or what—it really is.

            Part Two, for future publication, takes it further, diving into how to bake security into AI automation from
            the start, including best practices for managing machine identities and protecting the credentials that
            power these tools.



            About the Author

            Amit Zimerman is the Co-Founder and Chief Product Officer at Oasis
            Security. He is a seasoned leader with a diverse technical and product
            background.  Before  co-founding  Oasis,  he  played  pivotal  roles  at
            CyberMDX,  and  Microsoft,  bringing  a  wealth  of  product  and  security
            expertise. Amit also had significant contributions during his seven-year
            tenure in Israeli Military Intelligence forces as a leader of some of the
            high-profile cyber projects at the time.

            Amit can be reached online at [email protected] and at our company
            website https://www.oasis.security/














            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          284
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   279   280   281   282   283   284   285   286   287   288   289