Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»The AI safety conversation is focused on the wrong layer
    Cybersecurity

    The AI safety conversation is focused on the wrong layer

    adminBy adminMarch 24, 2026No Comments6 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    The AI safety conversation is focused on the wrong layer
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Organizations have spent years accumulating fragmented identity systems: too many roles, too many credentials, too many disconnected tools. For a workforce of humans, that fragmentation was manageable. Humans log in, log out, and make decisions slowly enough that gaps in control rarely turned into immediate incidents. AI agents operate differently.

    AI agent identity security

    “AI agents change that completely,” said Ev Kontsevoy, CEO of Teleport. “Now you’re introducing non-deterministic actors that don’t sleep, don’t follow predictable paths, and can move across your infrastructure in seconds. And in most environments, we’re plugging them into the exact same model we already struggle to manage, with static credentials, fragmented identity, and over-scoped access, and very little real-time visibility into what they’re actually doing.”

    Kontsevoy argues that identity sprawl has been misdiagnosed as a scaling problem. The underlying issue is control, and specifically, the absence of identity as a consistent control plane across infrastructure.

    “That’s the point where identity sprawl stops being something you can clean up later and starts becoming something you can’t control at all,” he said. “If you can’t answer, in real time, what an identity is, how it is verified, and what it’s doing, you’ve already lost the thread.”

    The building blocks exist. Consistent application does not.

    Human identity management developed over decades, producing standards like SAML and OAuth that now underpin enterprise authentication broadly. Non-human identity lacks that consistency, not because the technical primitives are absent, but because their application is uneven.

    Short-lived cryptographic credentials tied to verifiable identity, and policy-governed enforcement, are both available. The problem is that every platform, every cloud provider, and every tool implements them differently, producing the same kind of fragmentation that accumulated with human identity, but at larger scale and higher velocity.

    “What a real stack should look like is much simpler,” Kontsevoy said. “At its core, it requires a unified identity layer that treats every actor — human, machine, or AI agent — as a first-class identity. Every non-human identity should be strongly tied to something verifiable, whether that’s a workload, a device, or an agent. Access should be short-lived, continuously validated, and constrained to what that identity is authorized to do, based on policy, nothing more.”

    Kontsevoy described that architecture as technically feasible and said it is implemented in Teleport. The broader obstacle is conceptual: most organizations still treat identity as something added after infrastructure is built, rather than as infrastructure itself.

    Regulators are mapping new behavior onto old accountability models

    Regulated industries including finance, healthcare, and critical infrastructure are deploying agentic AI at a pace that regulatory frameworks have not matched. Existing accountability models assume that a human is ultimately responsible for any given decision, and that decisions are traceable to a linear chain of approvals.

    Agentic systems break that assumption. They can take actions, chain decisions together, and produce outcomes that are difficult to explain after the fact. There may be no single decision point, and in some cases no direct human actor at all.

    “Regulators are starting to recognize this, but they’re still early,” Kontsevoy said. “Most of the current frameworks focus on governance, risk classification, and documentation. That’s necessary, but it doesn’t solve the core problem, which is operational accountability.”

    He said operational accountability in agentic environments will ultimately depend on control over identity and the policies governing it. Organizations that can demonstrate, in real time, that every action was tied to a verified identity operating under enforced policy will be better positioned to satisfy regulatory scrutiny than those that can show policy documentation alone.

    Three steps for CISOs, and one set of habits to drop

    For security leaders beginning to address non-human identity, Kontsevoy outlined a sequence of three actions.

    The first is to establish identity as the control plane across the entire infrastructure. “Not by ripping and replacing everything,” he said, “but by making identity the control plane across your infrastructure. Every human, machine, workload, and AI agent should operate as a first-class identity within the same system.”

    The second is to eliminate static, long-lived credentials. “Static keys, shared secrets, anything that sits around waiting to be used, that model doesn’t hold up once you introduce agents operating continuously. Everything should be short-lived, issued on demand, and issued dynamically and tied to a cryptographically verifiable identity.”

    The third is to use the visibility gained from the first two steps to continuously harden the environment. Without a complete picture of what identities exist, including service accounts, workloads, and tokens, security teams are making access decisions without adequate information.

    On the actions to stop: “Stop creating new service accounts as a shortcut. Stop embedding credentials into scripts and workflows. Stop assuming that because something is ‘internal,’ it’s safe. Those habits were already risky, but with AI in the mix, they scale in ways that are very hard to unwind.”

    Model safety discussions are missing the bigger question

    Much of the public conversation about AI risk focuses on model behavior: hallucination, alignment, output quality. Kontsevoy said the more consequential risk in enterprise deployments sits in the identity and authorization layer, not in the models themselves.

    “If a model gives a bad answer, that’s usually recoverable,” he said. “If an agent with the wrong level of access takes the wrong action, that’s where you see real impact. Identity determines whether a mistake becomes an incident.”

    He described many of the AI risks that enterprises are concerned about as familiar security problems appearing in a new form. Fragmented identity, static credentials, and over-scoped permissions are not new phenomena. The difference is that AI systems can exercise that access continuously and at machine speed.

    “The question isn’t just whether the model is safe. It’s whether the identity behind it is continuously verified and constrained by policy.”

    In most enterprise environments, agents are connected to existing systems with broad access because speed of deployment takes priority over access hygiene. That approach inherits all of the identity fragmentation and credential risks already present in those environments. “If you get identity right, you reduce most of the real risk,” Kontsevoy said. “If you don’t, AI will simply amplify every weakness that’s already there.”

    conversation focused layer safety wrong
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleSystem parental controls 1.0.884660719 APK Download by Google LLC
    Next Article Google Adds AI & Bot Labels To Forum, Q&A Structured Data
    admin
    • Website

    Related Posts

    April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

    April 16, 2026

    Windows is getting stronger RDP file protections to fight phishing attacks

    April 16, 2026

    Medium-severity flaw in Microsoft SharePoint exploited

    April 16, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    NYT Strands hints and answers for Thursday, April 16 (game #774)

    April 16, 2026

    The Modern SEO Center Of Excellence: Governance, Not Guidelines

    April 16, 2026

    Raspberry Pi OS is getting a new security measure, and people are already annoyed

    April 16, 2026

    April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More

    April 16, 2026
    Categories
    • Blogging (63)
    • Cybersecurity (1,338)
    • Privacy & Online Earning (168)
    • SEO & Digital Marketing (821)
    • Tech Tools & Mobile / Apps (1,602)
    • WiFi / Internet & Networking (225)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    NYT Strands hints and answers for Thursday, April 16 (game #774)

    April 16, 2026

    The Modern SEO Center Of Excellence: Governance, Not Guidelines

    April 16, 2026

    Raspberry Pi OS is getting a new security measure, and people are already annoyed

    April 16, 2026
    Most Popular
    • NYT Strands hints and answers for Thursday, April 16 (game #774)
    • The Modern SEO Center Of Excellence: Governance, Not Guidelines
    • Raspberry Pi OS is getting a new security measure, and people are already annoyed
    • April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More
    • YouTube Premium is now 50% off for certain Google One subscribers
    • Windows is getting stronger RDP file protections to fight phishing attacks
    • Google adds campaign-level filtering to bulk ad review appeals
    • MKBHD pulls back the curtain on LG’s cancelled rollable
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.