ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A New Approach
Who it's for:
Who It’s For
  • Identity and access management professional
  • Security architects and engineers
  • AI and ML infrastructure teams
  • CISOs and cybersecurity leaders
  • Compliance and governance officers
  • Enterprise architects deploying Multi-Agent Systems

Agentic AI Identity and Access Management: A New Approach

Release Date: 08/18/2025

Agentic AI is pushing the boundaries of automation, autonomy, and decision-making at machine speed. But traditional identity and access management (IAM) protocols, designed for static applications and human users, can’t keep up.

This publication from the Cloud Security Alliance (CSA) introduces a purpose-built Agentic AI IAM framework that accounts for autonomy, ephemerality, and delegation patterns of AI agents in complex Multi-Agent Systems (MAS). It provides security architects and identity professionals with a blueprint to manage agent identities using Decentralized Identifiers (DIDs), Verifiable Credentials (VCs), and Zero Trust principles, while addressing operational challenges like secure delegation, policy enforcement, and real-time monitoring.

Readers will learn how to:
  • Identify shortcomings of OAuth 2.1, SAML, and OIDC in agentic environments
  • Define rich, verifiable Agent IDs that support traceable, dynamic authentication
  • Apply decentralized and privacy-preserving cryptographic architectures
  • Enforce fine-grained, context-aware access control using just-in-time credentials
  • Build zero trust IAM systems capable of scaling to thousands of agents

With detailed guidance on deployment models, governance consideration, and threat mitigation using the MAESTRO framework, this publication lays the foundation for secure identity and access in the next generation of AI systems.
Download this Resource

Bookmark
Share
Related resources
Introductory Guidance to AICM
Introductory Guidance to AICM
Capabilities-Based Risk Assessment (CBRA) for AI Systems
Capabilities-Based Risk Assessment (CBRA) for A...
AI Consensus Assessments Initiative Questionnaire (AI-CAIQ) v1.0.2
AI Consensus Assessments Initiative Questionnai...
Securing Application-to-Application Traffic with AI/AGI/ML-Powered Virtual Firewalls: A Comprehensive Framework for Multi-Cloud, Hybrid, and On-Premises Environments
Securing Application-to-Application Traffic with AI/AGI/ML-Powered ...
Published: 11/21/2025
Red Teaming Voice AI: Securing the Next Generation of Conversational Systems
Red Teaming Voice AI: Securing the Next Generation of Conversationa...
Published: 11/20/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
Understanding STAR for AI Level 2: A Practical Step Toward AI Security Compliance
Understanding STAR for AI Level 2: A Practical Step Toward AI Secur...
Published: 11/19/2025
Beyond Passwords: FIDO's Authentication Vision for Financial Services in the Cloud Era
Beyond Passwords: FIDO's Authentication Vision for Financial Servic...
December 12 | Virtual
Cloudbytes Webinar Series
Cloudbytes Webinar Series
January 1 | Virtual

Interested in helping develop research with CSA?

Related Certificates & Training