Beyond Identity: The CISO's Guide to Securing Agentic AI

AI agents are already operating in enterprise environments. Authorized, credentialed, and actively interacting with your most sensitive systems. The security question they raise isn't whether they have the right access. It's whether what they're doing with that access is appropriate. This guide is the framework for answering that question.
Key Takeaways from This Guide:
- Authorization is necessary, but it isn't sufficient. Identity controls can tell you what an agent was permitted to do. They can't tell you whether what it actually did was appropriate. That gap is where the most consequential agentic risks live, and where most enterprise programs currently have no visibility.
- AI agents are already in your enterprise, many of them ungoverned. Zenity research across Fortune 50 environments has found attack surfaces containing more than 150,000 resources tied to agents and automations, with 82% of those agents built by people who aren't professional developers. The inventory problem is urgent.
- Single-signal security leaves predictable blind spots. Identity-only, data-only, or model behavior-only monitoring each miss attacks that are only visible across signal domains. Closing the authorization gap requires assembling five signals at runtime: identity, data, model behavior, agent posture, and environment.
- Least privilege isn't enough. You need least agency. An agent can operate entirely within its authorized permissions and still behave in ways that are inappropriate for its declared purpose. Least agency governs what agents do within the reachable space, and the least agency ratio gives boards a metric to track it.
- Regulators are already asking behavioral questions. The EU AI Act, NIST AI RMF, and CAISI's February 2026 AI Agent Standards Initiative are all moving toward requiring evidence of behavioral monitoring, not just access control logs. "Authorization was granted" is no longer a sufficient compliance answer.
What You'll Learn from This Guide:
- Why the authorization gap exists and why IAM controls alone can't close it.
- The five-signal framework for intent-aware security and what each domain catches that the others miss.
- Real attack patterns documented by Zenity Labs, including the PleaseFix vulnerability family and zero-click attack patterns.
- The least agency principle, the behavioral governance complement to least privilege, and how to measure it with a board-ready ratio.
- How to build a defensible audit trail for agent activity, covering both execution observability and intent observability.
- A roadmap from agent inventory through full lifecycle governance, with milestones at each phase.
- How to align your agentic AI security program with the EU AI Act, NIST AI RMF, and emerging CAISI guidance.