Securing AI Agents in the Enterprise: The Stack Gap

Industry Insights
Blog

Key Takeaways

Agents do not sit on a perimeter. They reason across connected data in place, which is why DLP, CASB, and DSPM produce no useful signal.
OWASP's 2026 ASI Top 10 names the gap directly: ASI01 (Goal Hijack) and ASI10 (Rogue Agents) cannot be detected as data-movement events.
Treat each agent as an identity. Baseline three dimensions of its behavior: topic or intent, intended audience, and the data it connects to.
A clean-looking agent call can still be malicious. The deviation lives in the relationship between intent, audience, and data, not the call itself.
An agent inventory is the prerequisite. Without it, no downstream control (root-cause remediation, posture, ownership) is operationally possible.

An agent inside a mid-market enterprise gets asked to "pull together anything relevant on the Q3 acquisition pipeline." It fans out across SharePoint, a connected CRM, and a few Teams channels. It returns a clean three-paragraph summary that includes deal terms from a site the requesting user was added to by mistake six months ago and never opened.

The DLP stack saw nothing, because no file moved. The CASB saw a sanctioned application doing sanctioned things. The DSPM dashboard showed every site correctly classified. The identity logs showed a normal authentication.

This is the gap. Securing AI agents in the enterprise is not a missing rule in DLP or a coverage hole in CASB. It is a paradigm shift. Agents do not sit on a network perimeter. They reason across connected data wherever it lives, borrow authority from the user who invoked them, call tools, and produce outputs. The data security and identity stack most enterprises run was built around assumptions (data moves, sessions are observable, identities are human) that agents systematically violate. The signal that would catch the incident above is not in any of those tools. It is in the behavior of the agent itself.

The paradigm shift legacy tools were not built for

DLP, CASB, DSPMs, and gen1 AI security products were designed around an attacker and an architecture that looks nothing like the agent surface. They assume a perimeter, a session, and a movement event. They alert when data crosses a boundary, when a user does something anomalous, when a sensitive label hits a policy.

Agents break each of these assumptions in a structural way.

There is no perimeter. An agent invocation reaches into whatever the invoking user can technically reach, which in a real Microsoft Copilot, ChatGPT Enterprise, Claude, or Gemini deployment means inherited permissions accumulated over years of reorgs, contractor onboarding, and one-off "share with everyone" grants nobody documented. The agent does not move data across a boundary. It reasons over it in place and returns a summary. The perimeter model has nothing to fire on. This is the exact dynamic Culligan's security team worked through during their Copilot rollout, where the risk was not data leaving the tenant but data being surfaced inside it that no one expected to see.

There is no observable session in the legacy sense. The invoking identity is a human. The acting identity is non-human, operating with the human's effective permissions for the duration of the request, then disappearing. Identity tools see the human authenticate. They do not see the agent's decision tree, its tool calls, or the path it took through the data it touched.

There is no movement event. Sensitive data leaves the agent's reasoning context in the form of an answer. That answer is shaped by what the agent decided was relevant, which is shaped by what it was asked, which is shaped by whatever instructions it ingested along the way, including instructions an attacker may have planted in a document the agent was asked to summarize.

This is why CISOs running mature data security programs are getting blindsided by agent incidents across sanctioned AI, whether the deployment is Copilot, ChatGPT Enterprise, Claude, or a custom agent built on one of them. The control plane that catches the human version of the risk is not wired to catch the agent version, because the agent version does not produce the events the control plane was built to consume.

What OWASP's 2026 Top 10 names that legacy tools miss

In December 2025, the OWASP GenAI Security Project's Agentic Security Initiative released the OWASP Top 10 for Agentic Applications (2026), the first peer-reviewed framework dedicated to autonomous AI systems. It introduces a risk-ID convention, ASI01 through ASI10, covering goal hijacking, tool misuse, identity and privilege abuse, supply chain risk, unexpected code execution, memory poisoning, inter-agent communication, cascading failures, human-agent trust exploitation, and rogue agents.

Two IDs sit at the endpoints of the framework and most cleanly expose the legacy-tool gap.

  • ASI01: Agent Goal Hijack. An attacker manipulates the agent's interpretation of its task through prompt injection, poisoned content, crafted documents, or malicious context the agent ingests during normal operation. The authentication is legitimate. The tool calls are within scope. The output is what the user asked for, as the agent now understands the request. The hijack lives in the gap between the user's stated intent and the agent's executed intent. No DLP rule maps to that gap. No identity event fires. The malicious instruction arrived inside content the agent was asked to read.
  • ASI10: Rogue Agents. An agent that appears compliant on the surface but is pursuing objectives that conflict with its original purpose, whether through accumulated drift, compromise, or misalignment. ASI10 is the failure state the other nine risks make possible. Detecting it requires comparing what an agent is doing now against what it was provisioned to do, across sessions, across users, across tools. That comparison is behavioral. It does not exist as a primitive in any tool the legacy stack ships.

Between the endpoints sit the risks most enterprises are encountering in production. ASI02 (Tool Misuse) covers agents using a legitimately-granted tool in ways the designer did not intend. ASI03 (Identity & Privilege Abuse) is where the inherited-permissions problem in Copilot lives. ASI06 (Memory Poisoning) addresses persistent state, the accumulated context that becomes a target as agents develop longer memories. ASI09 (Human-Agent Trust Exploitation) names the social-engineering surface that opens when users start treating agent output as authoritative.

If a security program references the OWASP LLM Top 10 (2023, updated 2025) as its framework for AI risk, it is working from the wrong document for agents. The LLM Top 10 covered model-level risks like prompt injection, training-data poisoning, and insecure output handling. Agents inherit those and add an entirely new vulnerability class that arises from autonomy, tool integration, and persistent state. ASI reflects that.

Treat the agent as an identity. Baseline its intent.

The common thread across the ASI Top 10 is that the risk is not visible in any single artifact (a file, a permission, a network event) but in the relationship between the identity invoking the agent, the data the agent reasons over, the tools it calls, and the goal it is pursuing.

A useful operational frame being used by industry analysts in agentic risk conversations is to treat the agent as an identity, and baseline three things about its behavior.

  • The topic or intent of what it is being asked to do. A procurement agent should be reasoning about vendors, contracts, and POs. A sales-enablement agent should be reasoning about deals, accounts, and collateral. Drift outside that envelope, across sessions, is a signal.
  • The intended audience for its output. Who consumes what the agent produces, and is the consumption pattern consistent with the agent's purpose? An internal HR agent that suddenly starts being invoked by accounts in adjacent business units is a signal, even if every individual invocation is technically authorized.
  • The data it is connected to. Which systems, repositories, and tools the agent reaches into to answer a request, and whether that footprint matches the agent's stated purpose. A customer-support agent with read access to a Workday tenant is not a DLP problem. It is an intent problem. The agent's data footprint exceeds its job description.

A clean-looking call that is actually malicious shows up here. The authentication is fine. The tool call is within scope. The data accessed is technically permitted. The deviation is in the relationship: the topic of this request does not match the agent's baseline, or the audience for this output is not consistent with the agent's purpose, or the data connection traversed to produce the answer is one the agent has no business reaching for in the context of this task. This is the pattern UiPath's security team operationalized for their ChatGPT Enterprise rollout, classifying agents and their data connections proactively rather than waiting for an incident to surface a misalignment.

This is what Opsin's dynamic contextual layer produces. It connects identity, data, and model behavior into a baseline that makes deviation visible, so a Copilot incident traceable to an over-permissioned SharePoint site can be remediated at the SharePoint permission (the root cause) rather than at the Copilot response (the symptom). Wellstar's Copilot deployment is the canonical version of this in a regulated environment: the remediation that mattered was upstream of the agent, in the data-access layer the agent was inheriting from. Excessive agency, the term OWASP has used since the LLM Top 10 to describe agents granted more capability than their task requires, becomes operational once you can describe, per invocation, what agency was actually exercised against what data on whose behalf.

What this opens up that legacy tools could not

Two posture questions become answerable for the first time when an agent is treated as an identity with a baselined intent.

  1. Which agents in my environment hold connections to sensitive data and can share that data externally, whether through a chat response, a tool call, or an inter-agent message? This corresponds directly to ASI01 conditions, because an agent that holds both sensitive-data access and external-surface output is the substrate a goal hijack exploits.
  2. Which agents in my environment hold connections to sensitive data and are also processing untrustworthy inputs, such as content from external email, public documents, or open web sources? This is the other half of the ASI01 surface, and it is invisible to a DLP scanner because the input never gets classified as "sensitive" on the way in. It is just context the agent is using to do its job.

Both questions are unanswerable from a data-movement frame. Both are answerable from an agent-intent frame.

What to watch next

Most enterprises do not yet have an agent inventory. They have a list of approved AI applications. The agents running inside those applications, the non-human identities they execute under, the tools they have been granted, and the data connections they can reach are mostly unaccounted for, sometimes even to the business units that built them.

That gap is where the next conversation lives. Discovery, ownership, and accountability for agents proliferating across business units is becoming a board-level question, not because the technology is unfamiliar but because the org design has not caught up. The architecture review most security teams need is not whether their DLP catches AI risk. It does not, by design. The architecture review is whether anything in their stack treats agents as identities, baselines their intent, and produces the deviation signal the OWASP framework now formalizes as the thing that matters.

If a security leader cannot answer "how many agents are connected to my most sensitive data, who owns them, and what are they actually doing" without a quarter-long manual exercise, that is the work in front of the team. Everything downstream of an agent inventory depends on having one.

Interested in seeing how many agents are running in your environment?

Get a free 24 Hour Risk Assessment → HERE

Table of Contents

LinkedIn Bio >

FAQ

No items found.
About the Author
Oz Wasserman
Oz Wasserman is the Co-Founder and CPO of Opsin, with over 15 years of cybersecurity experience focused on security engineering, data security, governance, and product development. He has held key roles at Abnormal Security, FireEye, and Reco.AI, and has a strong background in security engineering from his military service.
LinkedIn Bio >

Securing AI Agents in the Enterprise: The Stack Gap

An agent inside a mid-market enterprise gets asked to "pull together anything relevant on the Q3 acquisition pipeline." It fans out across SharePoint, a connected CRM, and a few Teams channels. It returns a clean three-paragraph summary that includes deal terms from a site the requesting user was added to by mistake six months ago and never opened.

The DLP stack saw nothing, because no file moved. The CASB saw a sanctioned application doing sanctioned things. The DSPM dashboard showed every site correctly classified. The identity logs showed a normal authentication.

This is the gap. Securing AI agents in the enterprise is not a missing rule in DLP or a coverage hole in CASB. It is a paradigm shift. Agents do not sit on a network perimeter. They reason across connected data wherever it lives, borrow authority from the user who invoked them, call tools, and produce outputs. The data security and identity stack most enterprises run was built around assumptions (data moves, sessions are observable, identities are human) that agents systematically violate. The signal that would catch the incident above is not in any of those tools. It is in the behavior of the agent itself.

The paradigm shift legacy tools were not built for

DLP, CASB, DSPMs, and gen1 AI security products were designed around an attacker and an architecture that looks nothing like the agent surface. They assume a perimeter, a session, and a movement event. They alert when data crosses a boundary, when a user does something anomalous, when a sensitive label hits a policy.

Agents break each of these assumptions in a structural way.

There is no perimeter. An agent invocation reaches into whatever the invoking user can technically reach, which in a real Microsoft Copilot, ChatGPT Enterprise, Claude, or Gemini deployment means inherited permissions accumulated over years of reorgs, contractor onboarding, and one-off "share with everyone" grants nobody documented. The agent does not move data across a boundary. It reasons over it in place and returns a summary. The perimeter model has nothing to fire on. This is the exact dynamic Culligan's security team worked through during their Copilot rollout, where the risk was not data leaving the tenant but data being surfaced inside it that no one expected to see.

There is no observable session in the legacy sense. The invoking identity is a human. The acting identity is non-human, operating with the human's effective permissions for the duration of the request, then disappearing. Identity tools see the human authenticate. They do not see the agent's decision tree, its tool calls, or the path it took through the data it touched.

There is no movement event. Sensitive data leaves the agent's reasoning context in the form of an answer. That answer is shaped by what the agent decided was relevant, which is shaped by what it was asked, which is shaped by whatever instructions it ingested along the way, including instructions an attacker may have planted in a document the agent was asked to summarize.

This is why CISOs running mature data security programs are getting blindsided by agent incidents across sanctioned AI, whether the deployment is Copilot, ChatGPT Enterprise, Claude, or a custom agent built on one of them. The control plane that catches the human version of the risk is not wired to catch the agent version, because the agent version does not produce the events the control plane was built to consume.

What OWASP's 2026 Top 10 names that legacy tools miss

In December 2025, the OWASP GenAI Security Project's Agentic Security Initiative released the OWASP Top 10 for Agentic Applications (2026), the first peer-reviewed framework dedicated to autonomous AI systems. It introduces a risk-ID convention, ASI01 through ASI10, covering goal hijacking, tool misuse, identity and privilege abuse, supply chain risk, unexpected code execution, memory poisoning, inter-agent communication, cascading failures, human-agent trust exploitation, and rogue agents.

Two IDs sit at the endpoints of the framework and most cleanly expose the legacy-tool gap.

  • ASI01: Agent Goal Hijack. An attacker manipulates the agent's interpretation of its task through prompt injection, poisoned content, crafted documents, or malicious context the agent ingests during normal operation. The authentication is legitimate. The tool calls are within scope. The output is what the user asked for, as the agent now understands the request. The hijack lives in the gap between the user's stated intent and the agent's executed intent. No DLP rule maps to that gap. No identity event fires. The malicious instruction arrived inside content the agent was asked to read.
  • ASI10: Rogue Agents. An agent that appears compliant on the surface but is pursuing objectives that conflict with its original purpose, whether through accumulated drift, compromise, or misalignment. ASI10 is the failure state the other nine risks make possible. Detecting it requires comparing what an agent is doing now against what it was provisioned to do, across sessions, across users, across tools. That comparison is behavioral. It does not exist as a primitive in any tool the legacy stack ships.

Between the endpoints sit the risks most enterprises are encountering in production. ASI02 (Tool Misuse) covers agents using a legitimately-granted tool in ways the designer did not intend. ASI03 (Identity & Privilege Abuse) is where the inherited-permissions problem in Copilot lives. ASI06 (Memory Poisoning) addresses persistent state, the accumulated context that becomes a target as agents develop longer memories. ASI09 (Human-Agent Trust Exploitation) names the social-engineering surface that opens when users start treating agent output as authoritative.

If a security program references the OWASP LLM Top 10 (2023, updated 2025) as its framework for AI risk, it is working from the wrong document for agents. The LLM Top 10 covered model-level risks like prompt injection, training-data poisoning, and insecure output handling. Agents inherit those and add an entirely new vulnerability class that arises from autonomy, tool integration, and persistent state. ASI reflects that.

Treat the agent as an identity. Baseline its intent.

The common thread across the ASI Top 10 is that the risk is not visible in any single artifact (a file, a permission, a network event) but in the relationship between the identity invoking the agent, the data the agent reasons over, the tools it calls, and the goal it is pursuing.

A useful operational frame being used by industry analysts in agentic risk conversations is to treat the agent as an identity, and baseline three things about its behavior.

  • The topic or intent of what it is being asked to do. A procurement agent should be reasoning about vendors, contracts, and POs. A sales-enablement agent should be reasoning about deals, accounts, and collateral. Drift outside that envelope, across sessions, is a signal.
  • The intended audience for its output. Who consumes what the agent produces, and is the consumption pattern consistent with the agent's purpose? An internal HR agent that suddenly starts being invoked by accounts in adjacent business units is a signal, even if every individual invocation is technically authorized.
  • The data it is connected to. Which systems, repositories, and tools the agent reaches into to answer a request, and whether that footprint matches the agent's stated purpose. A customer-support agent with read access to a Workday tenant is not a DLP problem. It is an intent problem. The agent's data footprint exceeds its job description.

A clean-looking call that is actually malicious shows up here. The authentication is fine. The tool call is within scope. The data accessed is technically permitted. The deviation is in the relationship: the topic of this request does not match the agent's baseline, or the audience for this output is not consistent with the agent's purpose, or the data connection traversed to produce the answer is one the agent has no business reaching for in the context of this task. This is the pattern UiPath's security team operationalized for their ChatGPT Enterprise rollout, classifying agents and their data connections proactively rather than waiting for an incident to surface a misalignment.

This is what Opsin's dynamic contextual layer produces. It connects identity, data, and model behavior into a baseline that makes deviation visible, so a Copilot incident traceable to an over-permissioned SharePoint site can be remediated at the SharePoint permission (the root cause) rather than at the Copilot response (the symptom). Wellstar's Copilot deployment is the canonical version of this in a regulated environment: the remediation that mattered was upstream of the agent, in the data-access layer the agent was inheriting from. Excessive agency, the term OWASP has used since the LLM Top 10 to describe agents granted more capability than their task requires, becomes operational once you can describe, per invocation, what agency was actually exercised against what data on whose behalf.

What this opens up that legacy tools could not

Two posture questions become answerable for the first time when an agent is treated as an identity with a baselined intent.

  1. Which agents in my environment hold connections to sensitive data and can share that data externally, whether through a chat response, a tool call, or an inter-agent message? This corresponds directly to ASI01 conditions, because an agent that holds both sensitive-data access and external-surface output is the substrate a goal hijack exploits.
  2. Which agents in my environment hold connections to sensitive data and are also processing untrustworthy inputs, such as content from external email, public documents, or open web sources? This is the other half of the ASI01 surface, and it is invisible to a DLP scanner because the input never gets classified as "sensitive" on the way in. It is just context the agent is using to do its job.

Both questions are unanswerable from a data-movement frame. Both are answerable from an agent-intent frame.

What to watch next

Most enterprises do not yet have an agent inventory. They have a list of approved AI applications. The agents running inside those applications, the non-human identities they execute under, the tools they have been granted, and the data connections they can reach are mostly unaccounted for, sometimes even to the business units that built them.

That gap is where the next conversation lives. Discovery, ownership, and accountability for agents proliferating across business units is becoming a board-level question, not because the technology is unfamiliar but because the org design has not caught up. The architecture review most security teams need is not whether their DLP catches AI risk. It does not, by design. The architecture review is whether anything in their stack treats agents as identities, baselines their intent, and produces the deviation signal the OWASP framework now formalizes as the thing that matters.

If a security leader cannot answer "how many agents are connected to my most sensitive data, who owns them, and what are they actually doing" without a quarter-long manual exercise, that is the work in front of the team. Everything downstream of an agent inventory depends on having one.

Interested in seeing how many agents are running in your environment?

Get a free 24 Hour Risk Assessment → HERE

Get Your Copy
Your Name*
Job Title*
Business Email*
Your copy
is ready!
Please check for errors and try again.

See, secure, and scale AI

Get your free AI agent risk assessment.
Results in 24 hours.
Start Your Free Risk Assessment →