URL has been copied successfully!
Rethinking identity for the AI era: CISOs must build trust at machine speed
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Identity as a trust fabric: Most organizations currently rely on a welter of identity and access management systems for a variety of reasons. Some systems might be tied to a specific vendor’s technology; some might be legacy systems from mergers or acquisitions; some might be in place due to legal or regulatory requirements.”What happens even before we get to the agentic AI era is that identity today is actually in silos,” Vijay Gajjala, VP of product at identity security platform Oleria, tells CSO. “You have people who are still using on-prem identity, Active Directory, whatever. You also have people using cloud identity like Entra, Google Identity, and Okta. There isn’t a single way to answer the question of who has access to what. This is itself a fundamental problem.”That’s why the SINET Identity Working Group, which includes a host of internet infrastructure and security pioneers, including Heather Adkins, VP of security engineering at Google; Jason Lee, former CISO of Zoom and Splunk; Michael Montoya, CTO at F5; and many others, lays out a vision for what it calls an AI Trust Fabric, an “autonomous, self-healing system [that] depends entirely on trust.”This fabric consists of robust identity and protocols, where every entity has a unique and proofed identity. The protocols that are part of this fabric “must cryptographically prove both the ownership of a token and the origin of the identity in a sound, verifiable manner.”The group’s vision involves dynamic access and authorization that does away with static bearer tokens that often prove to be a liability. At the same time, the group suggests that authorizations should be finely grained and configurable via APIs for least-privileged agent access to tools, systems, and data.Moreover, access should be configurable on the fly and should not be a simple yes or no, but instead should reflect a dynamic composition based on all relevant entities in the chain. Finally, the fabric should make delegations of access explicit when an AI agent acts on behalf of a human or another AI agent and be built on specific revocation and just-in-time access policies.In essence, “We don’t want to give agents agency” when it comes to identity, Carey Frey, VP and CSO of TELUS and a SINET working group member, tells CSO.”We think of a human having access to something maybe for days, months, or years,” he adds. “But these agents could literally come and go in seconds or hours, and then they might spawn sub-agents and be in a whole network of other agents all around the world, and they could go off and start doing things which humans may never be able to catch up with.”

Better identity management to address AI’s known risks: An identity trust fabric could go a long way to preventing AI’s known risks. According to the SINET group, better identity management could be a proactive risk mitigation against several emerging AI threats, including:
CI/CD pipeline vulnerabilities, which consist of malicious code injected in LLMs that could poison an AI from inceptionPrompt injection, where attackers craft subtle, malicious inputs to manipulate an AI agent’s behaviorAI takeover/manipulation, which gives a threat actor control over an AI model’s output or decision-makingData poisoning, where attackers deliberately inject corrupted or misleading data into an AI model’s training datasetModel and training data disclosure, which is when attackers use carefully crafted prompts to trick AI agents into revealing sensitive information such as proprietary code, confidential business data, or personal information that the model was never meant to shareModel extraction or IP theft, where attackers continuously query APIs to reconstruct model behavior, stealing IP or disclosing proprietary, sensitive training dataOf all these threats, experts point to prompt injection as the most likely risk. “We do have the prompt injection problem,” Ely Kahn, chief product officer at SentinelOne, tells CSO. “It’s extremely easy for an adversary to find some exposed web asset or resource, put a malicious prompt in it, and then wait for an AI system to read that malicious prompt.””Then that AI system is tricked into starting to expose sensitive data,” he adds. “And I think we’re on the precipice of where we’re going to start seeing AI security-related attacks like prompt injections every week in the news headlines.”

How CISOs should prepare for the new identity era: The need for CISOs to implement improved identity systems or build something akin to an identity fabric will arrive quickly, although experts say it’s critical to have fundamental cybersecurity hygiene measures in place before even thinking about tackling a more comprehensive identity program.”The analogy I use is if you don’t have good hygiene, then anything new that you do would be bad,” Oleria’s Gajjala says. “If you don’t have good body hygiene and all of a sudden you bought a thousand-dollar suit, that doesn’t change the fact that you have bad hygiene.”Once the security basics are in place, preparing for the coming AI identity challenges should be a deliberate process that is not to be rushed. “You literally have to start from ground zero and think about how I am granting access to the data that I care about and how I measure that, and then how do I automate that in a way that I stay on top of this problem all the time,” Aireon’s Clay says.As is always the case when introducing new security programs into the organization, CISOs should work with decision-makers to pave the way for changes. “What we want CISOs to do is to work with their enterprises to say, we really need to have these solutions and put in place those security standards and models for identity and authentication before adopting new solutions,” says Frey, of TELUS.Like any other major security effort, “it always starts in the most boring and horrible place ever, which is governance,” Clay says. “You have to really start to understand what I am trying to protect and how I am trying to protect it before you start building tools and processes and everything else. Then that governance process is: A user can do this, this administrator can do that, this person can do this.”

First seen on csoonline.com

Jump to article: www.csoonline.com/article/4089732/rethinking-identity-for-the-ai-era-cisos-must-build-trust-at-machine-speed.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link