{"id":45316,"date":"2026-04-10T21:59:41","date_gmt":"2026-04-10T13:59:41","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/when-agentic-ai-becomes-your-riskiest-third-party-infosecurity-magazine\/"},"modified":"2026-04-10T21:59:41","modified_gmt":"2026-04-10T13:59:41","slug":"when-agentic-ai-becomes-your-riskiest-third-party-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/04\/10\/when-agentic-ai-becomes-your-riskiest-third-party-infosecurity-magazine\/","title":{"rendered":"When Agentic AI Becomes Your Riskiest Third Party &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>Agentic AI has evolved from a buzzword to a practical tool. Unlike a typical AI Large Language Model (LLM) these systems do more than generate text: They can plan tasks, act on them, and chain tools together autonomously. Essentially, they behave like digital teammates by performing multistep tasks toward specific goals, not just answer prompts.<\/p>\n<p>This new capability <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/how-cisos-can-defend-against-the-rise-of-ai-powered-cybercrime.html\" target=\"_self\">changes the security landscape<\/a> for your business.&nbsp;Many <a href=\"https:\/\/www.infosecurity-magazine.com\/opinions\/third-party-cyber-strategic\/\" target=\"_self\">third-party risk management<\/a> (TPRM) programs still treat AI tools as standard software. They ignore how the&nbsp;autonomy and system access in these tools can create a severe security&nbsp;risk. Organizations that underestimate agentic AI <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/ai-powered-cyberattacks-up\/\" target=\"_self\">may face operational, financial, and security problems<\/a>.<\/p>\n<h2><strong>Why AI Agents Are High-Privilege Vendors<\/strong><\/h2>\n<p>Autonomous AI agents are becoming part of modern SaaS ecosystems<strong>.<\/strong> These agents have access to data, can take&nbsp;actions, and can modify configurations.<\/p>\n<p>AI agents may read production logs, open tickets, modify firewall rules, or spin up&nbsp; cloud resources. But a&nbsp;lot of businesses continue to evaluate such tools in lightweight ways that are intended to provide analytics dashboards or HR systems. This can create&nbsp;fatal loopholes in security.<\/p>\n<h2><strong>Classifying Agentic AI in Third Party Risk Management <\/strong><\/h2>\n<p>The conventional third-party risk management programs categorize vendors according to data sensitivity and business impact. In the case of agentic AI, there should be a different level of autonomy and scope of action. For example:<\/p>\n<h3><strong>Tier A: Read-Only Copilots<\/strong><\/h3>\n<p>These agents have access to data, but they cannot alter it. They are secure in monitoring, reporting, and analyzing.<\/p>\n<h3><strong>Tier B: Suggest-Then-Act Agents<\/strong><\/h3>\n<p>These agents do not implement actions but suggest them. e.g., remediation actions. But the activities are not enforced without human approval. They save on manual work and maintain supervision.<\/p>\n<h3><strong>Tier C: Fully Autonomous Operators<\/strong><\/h3>\n<p>These agents can make&nbsp;direct alterations or modifications to cloud systems, identity platforms, and production environments. They are at the greatest risk, and they must be closely monitored.<\/p>\n<p>All layers will vary in their identity, logging and rollback requirements. Finer-grained service accounts, tamper-evident logs, a documented human kill switch, and rollback procedures should be present in Tier C agents.<\/p>\n<h2><strong>Key Due Diligence Questions<\/strong><\/h2>\n<p>Standard <a href=\"https:\/\/www.infosecurity-magazine.com\/blogs\/ensuring-backup-compliance-soc2\/\" target=\"_self\">SOC 2 or Standard ISO 27001<\/a> questionnaires are insufficient in agentic AI. Companies should ask:<\/p>\n<ul>\n<li>What actions can be undertaken by the agent in our environment?<\/li>\n<li>What are the permissions of its tools and connectors by user or by system?<\/li>\n<li>Does it have a full audit trail of all the actions?<\/li>\n<li>What does the vendor do to avoid injecting prematurely, misusing, or objectively drifting?<\/li>\n<\/ul>\n<p>These questions have started to be included in audits by major companies such as&nbsp;PwC. Nevertheless, they are not fully operationalized in most of the programs and&nbsp;companies that do not do these checks expose themselves.<\/p>\n<h2><strong>Practical Steps for Security Teams<\/strong><\/h2>\n<p>The deployment of agentic AI promises several advantages but can also raises cybersecurity&nbsp;risk. The <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/governance-gaps-agents-76-increase\/\" target=\"_self\">security challenges<\/a> can be made more difficult with complex setups and inadequate oversight. Therefore, businesses should:<\/p>\n<ul>\n<li>Consider agentic AI a different type of vendor.<\/li>\n<li>Modify policies to include risk level and autonomy.<\/li>\n<li>Modify contracts to deal with identity, logging, and rollback.<\/li>\n<li>Enter the activity data of the feed agents into continuous monitoring, rather than conducting annual reviews.<\/li>\n<\/ul>\n<p>This solution helps to strike a good balance between the efficiency advantages of AI agents and the need for high levels of surveillance.<\/p>\n<h2><strong>Agentic AI: Not Just Another Tool<\/strong><\/h2>\n<p>Consider a <a href=\"https:\/\/www.infosecurityeurope.com\/en-gb\/blog\/threat-vectors\/rethinking-cloud-security.html\" target=\"_self\">cloud environment<\/a> in which an AI agent will automatically spin credentials and additional rules in a firewall.<\/p>\n<p>When uncontrolled, it may result in conflicts, misconfigurations, or breaches. A Tier B strategy makes sure that there is a human who approves such actions and the risk is minimized, and time is saved.<\/p>\n<p>To avoid unintended consequences, a Tier C agent would need complete logs, access controls, and a kill switch.<\/p>\n<p>Agentic AI is not just another tool. It is a new type of third-party vendor with autonomy and privileges that require oversight. Treating these agents as standard software ignores the risks and creates vulnerabilities.<\/p>\n<p>By classifying agents by autonomy, asking agent-specific due diligence questions, and updating policies and monitoring, organizations can safely leverage their benefits. Recognizing agentic AI as a separate vendor class is essential to controlling risks while gaining operational value.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Agentic AI has evolved from a buzzword to a practical t [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-45316","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=45316"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/45316\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=45316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=45316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=45316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}