Tag: Access

Agentic AI guardrails are the technical controls, policy frameworks, and oversight mechanisms that define what an AI agent can do, what it can access and when it needs to stop and ask a human.
Most organizations still treat credentials as something that must be protected, stored, and rotated. But a second model is quietly reshaping how machine authentication works: eliminate static secrets altogether and authenticate workloads using identity and just-in-time access.
The OWASP Top 10 for LLM Applications is the most widely referenced framework for understanding these risks. First released in 2023, OWASP updated the list in late 2024 to reflect real-world incidents, emerging attack techniques and the rapid growth of agentic AI.
SPIFFE focuses on who a workload is. It issues cryptographic identities to services and workloads so they can prove their authenticity to each other without relying on stored secrets. OAuth focuses on what a workload is allowed to do. It defines how access is delegated and controlled when one service needs to interact with another or call an external API.
A ServiceNow impersonation flaw illustrates how agentic systems turn weak identity assumptions into durable access paths across enterprise environments.
From Coca-Cola to Campbell Soup, Renee Guttmann knows what lasts as security changes.
Instead of just trusting the token’s signature, attestation-based identity adds an extra layer of security.
OAuth 2.0 and OIDC solve fundamentally different problems.
Conditional access enhances security and reduces the attack surface without adding friction.
A practical walkthrough of the Auth0 settings and tweaks you’ll need to get an MCP server working smoothly with real-world clients like Claude.