{"id":16169,"date":"2026-05-04T11:46:18","date_gmt":"2026-05-04T11:46:18","guid":{"rendered":"https:\/\/newestek.com\/?p=16169"},"modified":"2026-05-04T11:46:18","modified_gmt":"2026-05-04T11:46:18","slug":"security-agencies-draw-red-lines-around-agentic-ai-deployments","status":"publish","type":"post","link":"https:\/\/newestek.com\/?p=16169","title":{"rendered":"Security agencies draw red lines around agentic AI deployments"},"content":{"rendered":"<div>\n<div id=\"remove_no_follow\">\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<section class=\"wp-block-bigbite-multi-title\">\n<div class=\"container\"><\/div>\n<\/section>\n<p>With prompt injection and other attack pathways consistently surfacing across agentic AI deployments, security watchdogs have stepped in, collectively, to draw some hard boundaries.<\/p>\n<p>A joint <a href=\"https:\/\/www.cyber.gov.au\/business-government\/secure-design\/artificial-intelligence\/careful-adoption-of-agentic-ai-services\" target=\"_blank\" rel=\"noreferrer noopener\">advisory<\/a> from the US Cybersecurity and Infrastructure Security Agency (CISA) and international partners has called for tighter control over permissions, stronger monitoring, and a more deliberate rollout strategy, urging organizations to treat agentic AI with caution.<\/p>\n<p>\u201cOrganizations cannot just drop agents into production and hope the guardrails hold,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/piyushsharrma\/\" target=\"_blank\" rel=\"noreferrer noopener\">Piyush Sharma<\/a>, CEO and co-founder of Tuskira, agreeing with CISA\u2019s instructions. \u201cThey need to understand what each agent can access, how it behaves, what systems trust its outputs, and which attack paths become reachable if it is manipulated.\u201d<\/p>\n<p>The advisory outlined design and development guidelines for organizations to follow before the implementation of AI agents. A few of these included strong authentication using <a href=\"https:\/\/www.csoonline.com\/article\/3971375\/secure-by-design-is-likely-dead-at-cisa-will-the-private-sector-make-good-on-its-pledge.html\">Secure by Design <\/a>principles, system transparency to flag deceptive indicators, least privilege across workflows, secure development principles as per DevSecOps <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/DoD%20Enterprise%20DevSecOps%20Fundamentals%20v2.5.pdf\">fundamentals<\/a>, and regular testing of incident response plans, among a host of others.<\/p>\n<p>The advisory was co-authored by the Australian Signals Directorate\u2019s Australian Cyber Security Centre, Canadian Centre for Cyber Security, New Zealand\u2019s National Cyber Security Centre, and the UK\u2019s National Cyber Security Centre.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Least privilege and tight boundaries<\/h2>\n<p>One of the clearest through-lines in the advisory was the need to constrain what agentic AI can access.<\/p>\n<p>\u201cPrivilege risks are a key concern for agentic AI, and strict adherence to the principle of least privilege is critical,\u201d CISA said in the advisory. \u201cPrivileges assigned to agents directly determine the level of risk they can introduce. Poor management of privileges can expose organisations to privilege compromise, scope creep, identity spoofing, and agent impersonation.\u201d<\/p>\n<p>The agencies emphasized enforcing least-privilege principles, isolating agent capabilities, and rigorously defining what data, tools, and systems each agent can interact with.<\/p>\n<p>This is easier said than done, especially as agents are increasingly <a href=\"https:\/\/www.csoonline.com\/article\/4163708\/microsoft-patched-an-agent-only-role-that-was-not.html\">wired<\/a> into APIs, internal systems, and external services. \u201cEvery tool, data source, memory store, and permission an agent touches becomes another possible way in for attackers,\u201d Sharma noted.<\/p>\n<p>To tackle this, the advisory recommends organizations maintain a clear inventory of agent capabilities and dependencies, while also validating how agents interpret and act on inputs. This includes guarding against prompt injection and ensuring that agents don\u2019t blindly trust external content or instructions.<\/p>\n<h2 class=\"wp-block-heading\"><a><\/a>Continuous monitoring with human-in-the-loop control<\/h2>\n<p>While the first half of the advisory focused on limiting what agents can do, the second was about watching what they actually do, reacting quickly when things go sideways.<\/p>\n<p>\u201cOperators should implement continuous monitoring and auditing to maintain awareness of AI agent operation and ensure traceability for decisions and actions,\u201d CISA added. \u201cContinuous auditing processes improve security measures and ensure alignment with governance standards (such as risk management, oversight, and usage restrictions).\u201d<\/p>\n<p>CISA and its international partners also recommended integrating human control and oversight into agentic AI workflows to ensure they are approved for non-sensitive, low-risk tasks. For this, the agencies suggested live monitoring during task execution, human approval for decision-making steps, and auditing upon task execution.<\/p>\n<p>Experts agree that visibility is critical. \u201cSecurity teams need continuous visibility into how agents behave, what systems they touch, and when their actions deviate from expected patterns,\u201d said <a href=\"https:\/\/www.linkedin.com\/in\/nicholas-tausek-6ab41611\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nick Tausek<\/a>, Lead Security Automation Architect at Swimlane. \u201cBuilding human approval into high-risk workflows and automating containment is paramount for taking action when agent behavior crosses a line.\u201d<\/p>\n<p>Putting it all together, the advisory detailed core risk areas, from prompt injection and data exposure to tool misuse and privilege creep, urging organizations to lock down privileged access, validate inputs and outputs, monitor agent behavior, and tightly control how these systems interact with data, tools, and other services.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>With prompt injection and other attack pathways consistently surfacing across agentic AI deployments, security watchdogs have stepped in, collectively, to draw some hard boundaries. A joint advisory from the US Cybersecurity and Infrastructure Security Agency (CISA) and international partners has called for tighter control over permissions, stronger monitoring, and a more deliberate rollout strategy, urging organizations to treat agentic AI with caution. \u201cOrganizations cannot just&#8230; <\/p>\n<p class=\"more\"><a class=\"more-link\" href=\"https:\/\/newestek.com\/?p=16169\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-16169","post","type-post","status-publish","format-standard","hentry","category-uncategorized","is-cat-link-borders-light is-cat-link-rounded"],"_links":{"self":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16169","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16169"}],"version-history":[{"count":0,"href":"https:\/\/newestek.com\/index.php?rest_route=\/wp\/v2\/posts\/16169\/revisions"}],"wp:attachment":[{"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newestek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}