Identity in the Agentic AI age
Thoughts from Identity Industry Veteran
The landscape of digital identity has undergone a dramatic transformation over the past two decades. What began as simple username-password combinations has evolved into a sophisticated, critical component of cybersecurity infrastructure. In a recent conversation, identity security expert Mohit Vaish, CEO of CyberSolve shared insights with Neha Garg about how identity management has become the cornerstone of modern security architecture—and what the future holds as AI agents enter the equation.
The Evolution of Digital Identity: More Than Just Credentials
From Backend Data to Security's Front Line
According to Vaish, identity has progressed far beyond its original function as a backend authentication mechanism. "Identity has evolved significantly over the past two decades, moving from being merely IDs and passwords to a fundamental representation of individuals in the digital world," he explains.
This evolution can be understood in three key phases:
Phase 1: Basic Authentication – Identity served primarily as a gatekeeping function with simple credential verification.
Phase 2: Control Plane – Identity became a control mechanism for digital interactions, governing what users could access and do within systems.
Phase 3: Security Foundation – Today, identity has transformed into the core element of security architecture itself.
Garg emphasized the significance of this shift, noting how bold it is to position identity not as a component of security, but as security itself. This perspective fundamentally changes how organizations approach their security posture.
Identity-Centric Detection: Beyond the Perimeter
Debunking the "New Perimeter" Myth
While the phrase "identity is the new perimeter" has become popular in cybersecurity circles, Vaish argues this terminology is misleading. Instead, he advocates for "identity-centric detection and response" as the more accurate framework.
Using an airport passport analogy, Vaish clarifies: "A passport enables trusted movement but is not the border itself. Similarly, identity facilitates secure interactions but is not the perimeter in isolation."
This distinction matters because it shifts focus from static boundary protection to dynamic threat detection and response centered on identity behavior.
The Reality of Identity-Based Attacks
Garg reinforces this perspective by highlighting a critical statistic: the majority of modern cyberattacks originate from compromised or stolen identities. This reality underscores why organizations need comprehensive identity detection and response strategies rather than treating identity as just another security layer.
Solving the Identity Telemetry Noise Problem
Understanding the Root Cause
One of the most persistent challenges facing security teams is the overwhelming volume of alerts and noise generated by identity monitoring systems. Vaish identifies the fundamental issue: organizations are conceptualizing identity incorrectly.
The Airport Security Analogy
Vaish draws a compelling parallel to airport security evolution: "Modern systems detect identities first and then focus on their movement, which effectively reduces noise compared to older systems that focused on changes in pixels."
Traditional security approaches generate alerts based on every change or anomaly in system behavior—similar to monitoring every pixel change on a security camera. In contrast, identity-first approaches:
- Establish who or what is performing an action
- Baseline normal behavior for that identity
- Focus detection on meaningful deviations from established patterns
Moving Beyond Bolt-On Solutions
The key to reducing identity-related noise lies in fundamentally rethinking how organizations identify and track entities within their environments. Technologies that can accomplish this shift away from bolt-on approaches—where identity monitoring is simply added to existing security systems—to integrated, identity-native architectures.
Identity in the Age of AI Agents: New Frontiers and Challenges
The AI Agent Multiplier Effect
As organizations increasingly deploy AI agents to act on behalf of humans, a new dimension of identity complexity emerges. Vaish explains that these agents create a multiplier effect on the attack surface while introducing unpredictable attack vectors.
A New Identity Model for Digital Delegates
Vaish proposes a comprehensive identity framework specifically designed for AI agents, which he calls "digital delegates." This model addresses several unique threat categories:
Agent Impersonation – Malicious actors creating fake agents or hijacking legitimate ones to bypass security controls.
Prompt Poisoning – Manipulating the instructions given to AI agents to alter their behavior in harmful ways.
Delegation Hijacks – Intercepting or redirecting the authority delegated from humans to their AI agents.
Cross-Agent Manipulation – Exploiting interactions between multiple agents to compromise systems laterally.
The Cascading Risk Factor
Garg highlights a particularly concerning aspect of AI agent security: inheritance of user capabilities. When large language models (LLMs) and AI agents inherit the full permissions of their human users, a single compromised user identity can have cascading effects throughout the entire agent network.
This reality makes managing and limiting the controls granted to AI agents not just important, but critical to organizational security.
The Future of Identity Management: Intent-Driven Defense
Vision for 5-10 Years Ahead
Looking toward the future, Vaish envisions a convergence of detection, response, and identification into what he calls "identity-intent-driven defense." This approach represents a fundamental shift in how organizations think about identity security.
Key Components of Future Identity Systems
Continuous Trust Scoring – Real-time assessment of identity trustworthiness based on multiple factors and behaviors.
Behavior Baselining – Establishing normal patterns based on transactional activities rather than static rules.
Automated Response Loops – Systems capable of quarantining risky identities proactively, before breaches occur rather than responding after the fact.
From IAM to Intent and Action Management
Perhaps most significantly, Vaish suggests reframing "Identity and Access Management" (IAM) as "Intent and Action Management." This linguistic and conceptual shift emphasizes:
- Continuous monitoring rather than point-in-time verification
- Behavioral aspects of identities over static attributes
- Understanding the "why" behind actions, not just the "what" and "who"
This evolution reflects a more dynamic, context-aware approach to identity security that aligns with the complexity of modern digital environments.
Preparing IAM Systems for the AI Agent Era
The Dual Nature of AI Agents
When asked how organizations should prepare their IAM systems for AI agents, Vaish recommends analyzing these entities through two complementary lenses:
AI Agents as Quasi-Humans:
- Permission assignment and management
- Least privilege principles
- Separation of duties
- Behavior monitoring and anomaly detection
AI Agents as Software Systems:
- Secrets management
- Integration with Privileged Access Management (PAM)
- Explainability requirements
- Robust logging and audit trails
Proficiency and Role-Based Management
Vaish confirms that organizations can and should assign proficiency levels and roles to AI agents, similar to human user management. This approach enables:
- Granular control over agent capabilities
- Clear accountability for agent actions
- Scalable management as agent populations grow
- Risk-appropriate access provisioning
Key Takeaways for Organizations
As identity continues its evolution from simple authentication to the foundation of security architecture, organizations should consider:
- Adopt Identity-Centric Thinking – Position identity as the core of your security strategy, not merely a component.
- Focus on Behavior, Not Just Access – Implement systems that understand normal identity behavior and detect meaningful deviations.
- Prepare for AI Agent Identity – Develop frameworks now for managing the unique identity challenges posed by AI agents and digital delegates.
- Reduce Noise Through Better Architecture – Invest in identity-first security architectures rather than bolting identity monitoring onto existing systems.
- Think Intent, Not Just Access – Shift from managing what identities can access to understanding and governing what they intend to do.
Conclusion
The evolution of digital identity from simple credentials to the cornerstone of cybersecurity represents one of the most significant shifts in information security. As Mohit Vaish's insights reveal, this transformation is far from complete. With AI agents introducing new complexities and attack surfaces, the future of identity management lies in intent-driven defense, continuous trust assessment, and behavioral understanding.
Organizations that grasp this evolution and prepare accordingly will be better positioned to secure their digital environments in an increasingly complex threat landscape. The question is no longer whether identity is important to security—it's how quickly organizations can embrace identity as security itself.