The Cloud Security Alliance surveyed 228 IT and security professionals in January and found a troubling reality: 85% of organizations run AI agents in production environments, but nobody has clear ownership of how these agents authenticate or what they can access. Task automation agents lead deployment at 67% of companies, followed by data retrieval (52%) and code generation agents (50%). These agents interact primarily with internal applications and APIs (56%), SaaS platforms (49%), and cloud infrastructure (44%).
This represents a fundamental infrastructure problem that enterprises seem determined to ignore until it breaks something important. We've seen this pattern before with containerization and microservices — new technology gets deployed faster than the supporting infrastructure evolves. The difference here is that AI agents can make decisions and take actions autonomously, making the blast radius of misconfigured access controls potentially catastrophic. When 43% of organizations use shared service accounts for agent access and 31% let agents operate under human identities, you're essentially flying blind.
The survey reveals the predictable organizational dysfunction: responsibility for agent access controls is scattered across security (28%), development (25%), and business teams (18%), with 15% unsure who's accountable when agents misbehave. Only 57% express moderate to high confidence that their agents have appropriately scoped access — a surprisingly honest admission that suggests the real number is much lower.
For developers building AI-powered systems, this should be a wake-up call. If your organization lacks clear agent identity management, you're probably inheriting significant security debt. Start asking hard questions about credential rotation, access logging, and incident response for your AI integrations before someone else's oversight becomes your production emergency." "tags": ["security", "identity", "enterprise", "agents
