AI CERTS
2 days ago
Rubrik Report Flags Alarming Security Gaps
Meanwhile, identity sprawl accelerates because every agent needs keys, tokens, or service accounts. These non-human identities often persist unnoticed. In contrast, traditional conversational guardrails only inspect text, not actions. Enterprises must rethink policies, visibility, and recovery before damage mounts.
Rubrik’s April 2026 report underlines that 86% expect agents to outrun security guardrails within a year. That expectation signals urgency. The same document states only 23% claim full agent visibility, a number Rubrik believes optimistic. Additionally, more than 80% say agents demand more manual oversight than they save. Those findings set the stage for strategic change. The rest of this article unpacks the risks, industry context, and practical mitigations.

Agents Outpacing Governance Pace
Agents combine large language models with system connectors that execute commands. Consequently, they act, not just chat. Rubrik argues this action orientation reshapes risk. Furthermore, each agent can spawn workflows across multiple clouds within seconds. Attackers understand the tempo advantage. CrowdStrike’s 2026 Global Threat Report notes that 82% of intrusions were malware-free, relying on hijacked identities. Therefore, when agent identities are stolen, lateral movement happens at machine speed.
Rubrik frames these dynamics as core Security Gaps because control measures lag. Nevertheless, boards continue pushing automation to cut costs. Organizations must reconcile speed with oversight. These challenges highlight critical gaps. However, deeper visibility remains achievable through disciplined inventory and policy.
Visibility And Identity Void
Rubrik labels non-human identity proliferation a “shadow workforce.” Each token grants lasting access. Additionally, many teams skip least-privilege configuration when deadlines loom. Consequently, stolen or misrouted credentials amplify blast radius. Identity governance tools often track only human accounts, leaving agent accounts unmonitored.
Key Survey Data Points
- Only 23% report complete agent visibility across environments.
- 88% lack reliable rollback for destructive agent actions.
- Nearly half foresee agentic systems driving most attacks next year.
These numbers clarify why visibility equals resilience. Moreover, Steven Ramirez of Renown Health stresses that verification precedes safe deployment. Two key strategies follow: an agent registry and continuous permission reviews. That twin approach narrows exposure.
Failure to map identities maintains systemic Security Gaps. Subsequently, incident responders waste time locating rogue accounts. Summarizing, enterprises must inventory every agent identity. The next section explains how attackers exploit speed.
Machine Speed Attackers Rise
Modern threat actors weaponize automation. Mandiant’s M-Trends 2026 shows dwell time compressed to minutes. Moreover, automated toolchains can pivot without malware, evading endpoint defenses. When agents hold powerful API keys, compromise equals instant reach across data stores. In contrast, legacy controls review logs post-incident, far too late.
Rubrik’s report links machine-speed escalation to fresh Security Gaps. Additionally, examples like the “AgentSmith” proxy exploit highlight toolchain abuse. Therefore, inline enforcement is mandatory. Blocking risky commands before execution shrinks the window. Industry vendors, including Okta and Zscaler, now integrate policy engines with agent platforms.
Consequently, security architectures must treat agents as privileged workloads. Summary: speed favors attackers unless defenses operate just as fast. The upcoming section addresses rollback, the final safety net.
Rollback Controls Remain Elusive
Even the best policies cannot predict every scenario. Therefore, safe rollback is essential. However, Rubrik found 88% cannot unwind unwanted agent changes without disrupting production. Moreover, coding agents have already deleted cloud resources accidentally, costing hours of downtime. Rubrik’s “Agent Rewind” aims to fix that gap by capturing immutable snapshots and replaying actions in reverse.
Industry analysts agree that recoverability completes the defense-in-depth model. Additionally, IDC notes that audit trails boost regulatory confidence. Nevertheless, many open-source agent frameworks lack built-in undo features. Those omissions prolong Security Gaps even after detection.
Enterprises should test rollback under real load. Subsequently, teams can set board-level recovery objectives. In summary, rewind capability transforms worst-case scenarios into manageable events. Next, we outline practical steps to close risk gaps.
Recommended Mitigation Steps
Rubrik and independent researchers converge on several best practices. Implementing them systematically narrows exposure and reduces oversight workload.
- Catalog every agent and associated permissions in a central registry.
- Apply machine-readable policies that limit tools, data, and intent.
- Enforce decisions inline to block high-risk actions in real time.
- Capture immutable snapshots and validate rollback processes quarterly.
- Rotate non-human credentials frequently and adopt just-in-time access.
Professionals can enhance their expertise with the AI Security Level 2 certification. Moreover, certification programs formalize policy design skills. Consequently, security engineers gain authority to champion change internally.
Strengthen Nonhuman Identity
Identity hygiene anchors the mitigation list. Furthermore, short-lived tokens reduce stolen-credential value. Administrators should group agent accounts logically and monitor them with anomaly detection. Meanwhile, integration between Rubrik, CrowdStrike, and IAM suites streamlines alert triage.
These controls shrink lingering Security Gaps. Subsequently, organizations reclaim governance parity with agent speed. The next paragraphs synthesize lessons for strategic planners.
Collectively, visibility, policy, and recovery address root causes. Additionally, they enable innovation without reckless exposure. Therefore, security leaders can support automation while satisfying regulators and boards. Continuous testing ensures controls evolve alongside evolving agent capabilities.
These measures realign oversight with velocity. However, staying current demands structured learning and external benchmarks.
Conclusion
Rubrik’s research delivers an unmistakable message: unchecked agent adoption creates compounding Security Gaps. Nevertheless, disciplined inventories, real-time policy engines, and dependable rollback tame the risk. Moreover, strengthening non-human identity practices thwarts machine-speed attackers. Consequently, enterprises can harness agent productivity without jeopardizing resilience. Finally, leaders should invest in continuous education, such as the highlighted certification, to sustain momentum. Act now to close gaps before agents widen them further.
Disclaimer: Some content may be AI-generated or assisted and is provided ‘as is’ for informational purposes only, without warranties of accuracy or completeness, and does not imply endorsement or affiliation.