Meet Aembit IAM for Agentic AI. See what’s possible →

Author: Dan Kaplan

True zero trust requires verified identity at every request and eliminating static credentials entirely.
Traditional static access control is inadequate for dynamic MCP server environments. Context-Based Access Control (CBAC) provides superior security by evaluating identity, context, and resource in real-time.
The exposure demonstrates how ordinary errors can reveal internal credentials and how stronger limits on scope and lifespan can contain the impact.
The incident demonstrates how autonomous behavior reshapes intrusion patterns when identity is not clearly assigned or enforced.
These four architectural patterns reveal how AI agents differ fundamentally from traditional workloads.
From Coca-Cola to Campbell Soup, Renee Guttmann knows what lasts as security changes.
The organizations succeeding with agentic AI are deploying it with constraints.
The Model Context Protocol (MCP), developed by Anthropic, standardizes how AI agents interact with external tools and data.
Secrets sprawl forces developers into constant rework while leaving organizations exposed to the exact security risks they’re trying to prevent.
The incident shows how repositories double as inadvertent credential stores, extending risk from vendors into customer environments.