Companies are rapidly deploying AI agents across their environments.

What’s less clear is how those agents are supposed to get access to the things they need.

To understand how organizations are handling that question, Aembit partnered with the Cloud Security Alliance to survey IT and security professionals.

Here’s what the data revealed.

73%
AI agents are moving into everyday operations
Nearly three-quarters of organizations expect AI agents to become “very important” or “critical” within the next year. Many are already running agents across development, security, and operations workflows.
68%
Organizations can’t clearly tell who did what
Over two-thirds say they cannot clearly distinguish between actions performed by AI agents and those performed by human users. When agents operate under shared or human identities, attribution becomes difficult.
9%
Almost no one owns AI agent identity
Only 9% say their identity or IAM team is responsible for managing AI agent access. Responsibility is mostly spread across security, engineering, and IT.
33%
Visibility into agent credentials is uneven
One-third of organizations say they are unsure how often credentials used by AI agents are rotated. In many cases, teams simply don’t have a clear view into how those credentials are being managed.
74%
AI agents often end up with more access than they need

Nearly three-quarters of respondents say AI agents frequently receive more access than necessary. Each additional permission can create another pathway into systems and data.

Identity and Access Gaps in the Age of Autonomous AI-cover
Cloud Security Alliance Report

AI agents are taking on real responsibilities inside enterprise environments.

Yet the identity models and access controls controlling those systems were designed for a bygone era – one centered on people and traditional software.

As agents become more embedded in everyday workflows, organizations will have to decide how these new identities are represented, granted permissions, and held accountable inside their systems.

Download the full Cloud Security Alliance report to explore the complete survey findings and detailed analysis.

By supplying my contact information, I authorize Aembit to contact me with personalized marketing communications about our products and services. See our Terms and Privacy Policy for more details.

Powered by
Sign Up for Updates
Identity-obsessed? Want to keep up with the Identity Universe?
Sign up to receive the latest news from Aembit!
Copyright © 2026. All rights reserved.