Download Publication
Who it's for:
Who It’s For
- Identity and access management professional
- Security architects and engineers
- AI and ML infrastructure teams
- CISOs and cybersecurity leaders
- Compliance and governance officers
- Enterprise architects deploying Multi-Agent Systems
Agentic AI Identity and Access Management: A New Approach
Release Date: 08/18/2025
Agentic AI is pushing the boundaries of automation, autonomy, and decision-making at machine speed. But traditional identity and access management (IAM) protocols, designed for static applications and human users, can’t keep up.
This publication from the Cloud Security Alliance (CSA) introduces a purpose-built Agentic AI IAM framework that accounts for autonomy, ephemerality, and delegation patterns of AI agents in complex Multi-Agent Systems (MAS). It provides security architects and identity professionals with a blueprint to manage agent identities using Decentralized Identifiers (DIDs), Verifiable Credentials (VCs), and Zero Trust principles, while addressing operational challenges like secure delegation, policy enforcement, and real-time monitoring.
Readers will learn how to:
- Identify shortcomings of OAuth 2.1, SAML, and OIDC in agentic environments
- Define rich, verifiable Agent IDs that support traceable, dynamic authentication
- Apply decentralized and privacy-preserving cryptographic architectures
- Enforce fine-grained, context-aware access control using just-in-time credentials
- Build zero trust IAM systems capable of scaling to thousands of agents
With detailed guidance on deployment models, governance consideration, and threat mitigation using the MAESTRO framework, this publication lays the foundation for secure identity and access in the next generation of AI systems.
Download this Resource
Interested in helping develop research with CSA?
Related Certificates & Training
.png)
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more


.jpeg)
.jpeg)
.jpeg)

.jpg)
