
Free, private email that puts your privacy first
A private inbox doesn’t have to come with a price tag—or a catch. Proton Mail’s free plan gives you the privacy and security you expect, without selling your data or showing you ads.
Built by scientists and privacy advocates, Proton Mail uses end-to-end encryption to keep your conversations secure. No scanning. No targeting. No creepy promotions.
With Proton, you’re not the product — you’re in control.
Start for free. Upgrade anytime. Stay private always.
Welcome to the 119th edition of the Identity Jedi Newsletter. It’s been a minute I know. But with Season Four of the Podcast currently filming, and some super secret work I’ve been doing, the days have been flying by! But we’re back, and man do we have some things to talk about!
Let’s get to the good stuff!
Identity Jedi Store
Don’t forget to check out the Identity Jedi Store. Digital product
AI Agents Bypass Human Identity Controls
AI agents operate 24/7 with static permission sets that only expand. Your vulnerability-scanning AI needs access to developer repositories. Your code review agent inherits security team permissions. Your compliance bot gets auditor-level database reads. None of these expires.
This isn't theoretical anymore. Nation-state iPhone exploits become commodity attacks against consumer platforms. AI malware generation outpaces human updates to detection rules. The identity governance assumptions that worked for human employees are failing at machine speed because machines don't take vacations or change departments.
It’s a new, exciting, scary, and fast-moving world
News
Let’s talk AI Agents
AI agents expose the fundamental flaw in identity governance: most organizations treat access as a permanent asset rather than a time-bounded entitlement, creating automated privilege creep that scales at machine speed. Identity teams have spent decades perfecting human authentication flows while AI agents bypass every login system through ambient data collection and inherited privileges.
The pattern is consistent across every AI deployment. Organizations provision AI identities like contractor badges with infinite duration. Code scanners inherit developer repository access. Vulnerability hunters get security team permissions. Identity verification systems learn from poisoned datasets. Same access models, same lifecycle assumptions, same governance gaps.
Your AI security strategy is broken because you're still using human identity patterns for non-human agents that don't sleep, don't quit, and don't forget their passwords. Human identity governance assumes periodic review cycles, vacation breaks, and natural privilege decay through role changes. AI agents operate continuously with static permission sets that accumulate over time.
This creates a cascade failure in identity architecture. AI code scanning tools need privileged repository access to function effectively. Most organizations grant these tools the same access patterns they would give a senior developer, but with none of the human judgment about appropriate use. The AI scanner operates 24/7 with developer-level privileges, creating persistent insider threat patterns that human-designed governance can't detect or contain.
The threat isn't AI going rogue. The threat is AI inheriting decades of identity governance debt and executing it perfectly. Nation-state exploitation tools hitting consumer markets while organizations deploy AI agents with contractor-level access and employee-level persistence. The attack surface isn't just expanding; it's automating at machine speed with human-designed permission sets that were never built for continuous operation.
Consider how AI agents amplify every existing identity governance failure. Orphaned service accounts become AI agent credentials. Excessive privileged access becomes automated privilege escalation. Poor lifecycle management becomes permanent machine identity sprawl. The AI doesn't create new vulnerabilities; it inherits and automates existing identity governance debt at scale.
Most identity teams are still defending against script kiddies while AI-powered attacks scale malware generation faster than human security teams can update detection rules. The automation arms race isn't just about offensive capabilities. It's about governance systems that can't adapt at the speed at which AI agents operate and evolve.
The lifecycle endpoint problem becomes critical when AI agents inherit access patterns designed for humans who eventually leave the organization. Posthumous digital identity standards emerge because AI systems trained on deceased persons' digital footprints create deepfake fraud, but most organizations can't even handle living employee offboarding properly. How do you terminate an AI agent's access when the agent was granted permanent repository privileges?
Building identity governance that works at machine speed requires abandoning the assumption that access grants are permanent assets. AI agent credentials need automatic expiration windows, continuous privilege validation, and governance controls that account for 24/7 operation patterns. The design principle shifts from granting access to granting time-bounded entitlements that require active renewal rather than passive accumulation.
Way of the Jedi
Ok so what should you do?
Audit AI agent credentials separately from human identities and map their access patterns to business functions.
• Define AI identity lifecycle policies with automatic expiration windows rather than permanent access grants.
• Implement continuous privilege validation for AI agents that operate outside normal business hours and review cycles.
• Create governance controls for AI agents that inherit privileged access to codebases, datasets, or infrastructure systems.
• Establish monitoring for AI agent privilege creep and automated access pattern changes that exceed their defined operational scope.
Finally, have some strategic but very frank conversations with your solution providers. What’s the plan around AI agent security? How are they providing discovery tools, access context, guardrail deployment, etc? Remember no one has it figured out yet, but together we’ll get there.
Podcasts
The Last Word
It’s about to be a crazy year. RSA is just around the corner, and every company and its mother will be talking about AI Agent Security. In fact, as you’re reading this, there are 10 companies pitching their startup right now! So cut through the noise and focus on what’s important to you and your organization. The truth of it is, we are all trying to figure it out, and while the problems are the same ( visibility, governance, detection and response) the execution for this space is different.
If you’re at RSA, let’s link up! Grab a pic, or even play pickleball ( Yes, Pickleball!).
Also, Season Four of the Identity Jedi Show is filming, so if you want to be a guest on the show ( and yes, vendors welcome), hit us up at [email protected]. Slots are filling up fast!
Be good to each other, be kind to each other, love each other





