{"id":28710,"date":"2026-05-09T21:06:06","date_gmt":"2026-05-09T15:36:06","guid":{"rendered":"https:\/\/www.aicerts.ai\/news\/"},"modified":"2026-05-09T21:06:10","modified_gmt":"2026-05-09T15:36:10","slug":"agent-identity-reshapes-runtime-security","status":"publish","type":"news","link":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/","title":{"rendered":"Agent Identity reshapes runtime security"},"content":{"rendered":"\n<p>The launch reframes Agent Identity as the missing pillar of Zero Trust strategy. Meanwhile, rival vendors announced comparable controls, signaling a fresh arms race around runtime protection. This article dissects the drivers, technologies, and unanswered questions shaping that race. Additionally, it offers practical guidance for enterprises preparing their own agent governance programs. Readers will leave with actionable steps and certification resources to deepen expertise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Agent Identity Market Drivers<\/h2>\n\n\n\n<p>Business leaders adopt generative and task-oriented agents to cut costs and accelerate workflows. Moreover, Cisco marketing claims 85% of enterprises now run at least one agentic pilot. Analyst surveys show lower production numbers, yet momentum remains undeniable. Consequently, identity leaders see revenue upside in extending IAM principles to non-human actors. Agent Identity offers accountability by mapping each agent to a named human owner. Furthermore, regulators increasingly demand provenance for any automated decision influencing customers or markets. <\/p>\n\n\n\n<p>Zero Trust guidelines already encourage continuous verification of every request, whether human or machine. Therefore, runtime identity for agents aligns cleanly with broader Access Control modernization programs. Board members notice headlines about exposed agents and ask tough questions about audit readiness. That pressure turns theoretical frameworks into funded security roadmaps. In summary, market demand, regulation, and risk combine to make Agent Identity inevitable. These factors create unprecedented urgency. Next, we examine specific risks threatening the agentic workforce.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/05\/securing-access-with-identity.jpg\" alt=\"Secure login process using Agent Identity verification interface on desktop.\"\/><figcaption class=\"wp-element-caption\">User authenticating with Agent Identity\u2019s secure interface for stronger runtime protection.<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Evolving Agentic Workforce Risks<\/h2>\n\n\n\n<p>Security researchers scanned public endpoints during RSA preparations. They found more than 30,000 exposed agent instances vulnerable to remote code execution. In contrast, other scans flagged 15,200 more agents lacking any authentication guardrails. Consequently, Etay Maor quipped, \u201cYour AI? It\u2019s my AI now.\u201d The joke illustrates why runtime Access Control matters. Self-modifying code, ghost agents, and unchecked agent-to-agent delegation compound the danger. <\/p>\n\n\n\n<p>Furthermore, traditional IAM tools rarely monitor model context or tool calls in real time. Therefore, attackers may weaponize an authorized agent to exfiltrate data without tripping legacy alerts. Zero Trust architectures promise continuous verification, yet they need reliable agent telemetry to deliver.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Self-modification without detection<\/li>\n\n\n\n<li>Stale credentials enabling ghost agents<\/li>\n\n\n\n<li>Opaque delegation between cooperating agents<\/li>\n<\/ul>\n\n\n\n<p>These concrete threats validate Cisco and Ping Identity product roadmaps. However, capabilities matter more than claims, so let\u2019s inspect Duo\u2019s offering.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Duo Platform Core Features<\/h2>\n\n\n\n<p>Duo positions its new stack as the heart of Cisco\u2019s larger secure-access portfolio. At launch, it registers every agent as a first-class object within the Duo directory. Moreover, Agent Identity ties that object to a responsible human and a compliance policy set. Each agent receives just-in-time credentials scoped for a single task. Consequently, lingering standing privileges disappear once the task finishes. The platform also funnels tool calls through an MCP gateway embedded within Cisco Secure Access. <\/p>\n\n\n\n<p>Policy decisions happen at runtime, not minutes later inside log analytics pipelines. Additionally, Cisco Identity Intelligence inspects network traffic to discover shadow agents the directory missed. Events flow into existing SOC dashboards, preserving analyst workflows. In effect, Agent Identity becomes an extension of familiar IAM administration patterns rather than a bolt-on. These capabilities anchor the Cisco messaging around unified Access Control across humans and machines. Such alignment may ease funding conversations with security leadership. Duo\u2019s feature list demonstrates maturity. Nevertheless, runtime enforcement remains the decisive battleground.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Runtime Gateway Enforcement Explained<\/h2>\n\n\n\n<p>Runtime gateways mediate every call an agent makes to external or internal services. Consequently, they evaluate context, sign short-lived tokens, and either permit or block the request. The Model Context Protocol emerged as the lingua franca for these enforcement layers. Moreover, gateways inject headers that embed Agent Identity, task scope, and expiration metadata. Security engineers compare this process to OAuth, yet the granularity operates at tool function level. <\/p>\n\n\n\n<p>Meanwhile, traditional IAM platforms often authorize at session start, leaving blind spots mid-execution. Zero Trust guidance recommends shifting those authorizations to the precise moment of action. Therefore, MCP gateways embody that recommendation and reduce the blast radius of compromised tokens. Additionally, built-in analytics score agent behavior and flag anomalies before damage escalates. These runtime insights feed back into broader Access Control governance workflows. In summary, gateway enforcement operationalizes Agent Identity and sets the practical baseline for industry adoption. Next, we benchmark competing offerings and their unresolved gaps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Competitive Landscape And Gaps<\/h2>\n\n\n\n<p>RSA 2026 showcased at least five vendor frameworks targeting the same pain points. Ping Identity pushed its \u201cIdentity for AI\u201d suite into general availability on March 31, 2026. In contrast, CrowdStrike, Microsoft, and Palo Alto demonstrated discovery modules but lacked runtime gateways. Moreover, analysts noticed three persistent gaps across products.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Self-modification detection still immature<\/li>\n\n\n\n<li>Agent-to-agent delegation chain lacking<\/li>\n\n\n\n<li>Credential cleanup after decommission<\/li>\n<\/ul>\n\n\n\n<p>Furthermore, some marketing statistics appear optimistic when compared with independent adoption surveys. Duo claims broad customer pilots, yet public case studies remain scarce. Zero Trust messaging resonates, though technical evidence must validate vendor promises. Consequently, buyers evaluate proof-of-concept data before committing budget. These realities encourage careful roadmap planning. Subsequently, enterprises look beyond branding to protocol specifics. Competitive pressure accelerates innovation, but foundational gaps persist. The next section explores emerging standards that may bridge those gaps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Future Standards And Governance<\/h2>\n\n\n\n<p>Standards bodies now draft guidance aimed at normalizing terminology and trust primitives. NIST presentations at RSA stressed the urgency of registries for Agent Identity metadata. Moreover, the Coalition for Secure AI is prototyping open schemas for delegation verification. Meanwhile, vendors debate whether MCP should fold into existing OAuth flows or stand alone. Regulators watch closely, because autonomous actions impact consumer privacy and safety regulations. <\/p>\n\n\n\n<p>Therefore, voluntary frameworks could mature into mandated certification regimes within a year. IAM architects should track draft documents to avoid future retrofit costs. Additionally, Access Control checklists will likely incorporate runtime gateway requirements. These governance moves create a predictable direction for vendor roadmaps. Consequently, early adopters can align today and minimize technical debt. Standardization promises interoperability and auditability. Nevertheless, enterprises still need actionable guidance, delivered next.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Takeaways And Actions<\/h2>\n\n\n\n<p>Every autonomous agent introduces identity, privilege, and provenance challenges. Agent Identity provides the mapping, governance, and runtime enforcement required to close those gaps. Leading vendors supply a mature toolkit, yet verification through pilots remains essential. Furthermore, runtime gateways operationalize governance and satisfy strict security mandates. <\/p>\n\n\n\n<p>Organizations should start by inventorying agents, documenting owners, and defining least-privilege policies. Subsequently, integrate a gateway and issue short-lived tokens for every tool call. Professionals can deepen expertise through the <a href=\"https:\/\/www.aicerts.ai\/certifications\/security\/ai-security-level-1\">AI Security Level 1<\/a> certification. Consequently, teams gain practical skills for architecting robust Agent Identity journeys. Adopt these steps now to future-proof agentic operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The age of autonomous software agents has arrived inside corporate networks. However, many security teams still treat those agents like random lines of code. Such oversight creates new attack surfaces that adversaries already exploit in the wild. Consequently, controlling every agent action has become a board level mandate. At RSA Conference 2026, Cisco responded with Duo Agentic Identity enhancements and an MCP gateway. <\/p>\n","protected":false},"featured_media":28709,"parent":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Agent Identity","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Explore how Agent Identity, Duo upgrades, and Zero Trust controls secure AI agents and stop runtime threats across modern enterprises.","_yoast_wpseo_canonical":""},"tags":[334,110,1571,8,38490,38491,55,38489,38492],"news_category":[4,2735],"communities":[],"class_list":["post-28710","news","type-news","status-publish","has-post-thumbnail","hentry","tag-ai-certifications","tag-ai-innovation","tag-ai-platform","tag-artificial-intelligence","tag-duo","tag-mcp-gateway","tag-productivity-tools","tag-rsa-conference-2026","tag-runtime-enforcement","news_category-ai","news_category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Agent Identity reshapes runtime security - AI CERTs News<\/title>\n<meta name=\"description\" content=\"Explore how Agent Identity, Duo upgrades, and Zero Trust controls secure AI agents and stop runtime threats across modern enterprises.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Agent Identity reshapes runtime security - AI CERTs News\" \/>\n<meta property=\"og:description\" content=\"Explore how Agent Identity, Duo upgrades, and Zero Trust controls secure AI agents and stop runtime threats across modern enterprises.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/\" \/>\n<meta property=\"og:site_name\" content=\"AI CERTs News\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-09T15:36:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/05\/agent-identity-in-action.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/\",\"url\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/\",\"name\":\"Agent Identity reshapes runtime security - AI CERTs News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aicertswpcdn.blob.core.windows.net\\\/newsportal\\\/2026\\\/05\\\/agent-identity-in-action.jpg\",\"datePublished\":\"2026-05-09T15:36:06+00:00\",\"dateModified\":\"2026-05-09T15:36:10+00:00\",\"description\":\"Explore how Agent Identity, Duo upgrades, and Zero Trust controls secure AI agents and stop runtime threats across modern enterprises.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aicertswpcdn.blob.core.windows.net\\\/newsportal\\\/2026\\\/05\\\/agent-identity-in-action.jpg\",\"contentUrl\":\"https:\\\/\\\/aicertswpcdn.blob.core.windows.net\\\/newsportal\\\/2026\\\/05\\\/agent-identity-in-action.jpg\",\"width\":1024,\"height\":576,\"caption\":\"Cybersecurity professionals work together, leveraging Agent Identity to secure enterprise environments.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/agent-identity-reshapes-runtime-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Agent Identity reshapes runtime security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/\",\"name\":\"Aicerts News\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/#organization\",\"name\":\"Aicerts News\",\"url\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/news_logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/09\\\/news_logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Aicerts News\"},\"image\":{\"@id\":\"https:\\\/\\\/www.aicerts.ai\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Agent Identity reshapes runtime security - AI CERTs News","description":"Explore how Agent Identity, Duo upgrades, and Zero Trust controls secure AI agents and stop runtime threats across modern enterprises.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/","og_locale":"en_US","og_type":"article","og_title":"Agent Identity reshapes runtime security - AI CERTs News","og_description":"Explore how Agent Identity, Duo upgrades, and Zero Trust controls secure AI agents and stop runtime threats across modern enterprises.","og_url":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/","og_site_name":"AI CERTs News","article_modified_time":"2026-05-09T15:36:10+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/05\/agent-identity-in-action.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/","url":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/","name":"Agent Identity reshapes runtime security - AI CERTs News","isPartOf":{"@id":"https:\/\/www.aicerts.ai\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/#primaryimage"},"image":{"@id":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/#primaryimage"},"thumbnailUrl":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/05\/agent-identity-in-action.jpg","datePublished":"2026-05-09T15:36:06+00:00","dateModified":"2026-05-09T15:36:10+00:00","description":"Explore how Agent Identity, Duo upgrades, and Zero Trust controls secure AI agents and stop runtime threats across modern enterprises.","breadcrumb":{"@id":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/#primaryimage","url":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/05\/agent-identity-in-action.jpg","contentUrl":"https:\/\/aicertswpcdn.blob.core.windows.net\/newsportal\/2026\/05\/agent-identity-in-action.jpg","width":1024,"height":576,"caption":"Cybersecurity professionals work together, leveraging Agent Identity to secure enterprise environments."},{"@type":"BreadcrumbList","@id":"https:\/\/www.aicerts.ai\/news\/agent-identity-reshapes-runtime-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aicerts.ai\/news\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.aicerts.ai\/news\/news\/"},{"@type":"ListItem","position":3,"name":"Agent Identity reshapes runtime security"}]},{"@type":"WebSite","@id":"https:\/\/www.aicerts.ai\/news\/#website","url":"https:\/\/www.aicerts.ai\/news\/","name":"Aicerts News","description":"","publisher":{"@id":"https:\/\/www.aicerts.ai\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aicerts.ai\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aicerts.ai\/news\/#organization","name":"Aicerts News","url":"https:\/\/www.aicerts.ai\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/","url":"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg","contentUrl":"https:\/\/www.aicerts.ai\/news\/wp-content\/uploads\/2024\/09\/news_logo.svg","width":1,"height":1,"caption":"Aicerts News"},"image":{"@id":"https:\/\/www.aicerts.ai\/news\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news\/28710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/types\/news"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/comments?post=28710"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/media\/28709"}],"wp:attachment":[{"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/media?parent=28710"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/tags?post=28710"},{"taxonomy":"news_category","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/news_category?post=28710"},{"taxonomy":"communities","embeddable":true,"href":"https:\/\/www.aicerts.ai\/news\/wp-json\/wp\/v2\/communities?post=28710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}