Cybersecurity & Identity

Agentic Security: Bridging the Identity Gap with Cisco and Reco's Autonomous Framework

Dillip Chowdary By Dillip ChowdaryMar 25, 2026

In the rapidly evolving landscape of enterprise AI, a new threat vector has emerged: the **Autonomous AI Agent**. Unlike traditional software, these agents possess the agency to act, negotiate, and execute transactions on behalf of human users. However, this power comes with a critical vulnerability—**Identity**. As agents proliferate, the traditional boundary of identity management is dissolving, giving rise to what Cisco and Reco call the "Identity Gap." To close it, they have unveiled a comprehensive **Agentic Security** framework designed for the age of autonomous systems.

The Rise of Non-Human Identities (NHI)

For decades, security teams have focused on human identity. We've mastered Multi-Factor Authentication (MFA), Single Sign-On (SSO), and Role-Based Access Control (RBAC) for employees. But **AI Agents** are not employees; they are **Non-Human Identities** (NHI). They don't have biometrics, they don't use hardware keys, and they often operate in the background, making thousands of API calls per minute. This shift requires a fundamental rethinking of how we define and protect "trust" within a digital ecosystem.

Cisco's research indicates that by late 2026, NHIs will outnumber human identities in the average enterprise by a factor of 40 to 1. The **Cisco-Reco** framework addresses this by treating every AI agent as a unique cryptographic entity with its own **Security Posture**. This moves the focus from "who is this user?" to "what is this agent authorized to do, and is it currently acting within its defined guardrails?" The framework also accounts for the **Lifecycle of an Agent**, from creation and authorization to its eventual decommissioning, ensuring that "Orphaned Agents" don't become permanent backdoors.

Another layer of complexity is the Recursive Agency. One agent might call another agent, which in turn calls a third-party API. The Cisco-Reco framework uses Identity Chaining to track the lineage of these calls, ensuring that the final action is always cryptographically linked back to the original authorized intent. This "Proof of Intent" is critical for auditing and compliance in highly regulated industries.

Core Pillar: Identity Security Posture Management (ISPM)

The heart of the new framework is **ISPM**. Traditional Identity and Access Management (IAM) is static; it grants permissions and forgets them. ISPM is dynamic. By integrating Reco's advanced identity-graph technology with Cisco's **Secure Access** (SSE) platform, the framework can monitor agent behavior in real-time across SaaS, IaaS, and on-premise environments. The identity graph maps every connection between an agent, the data it accesses, and the humans who supervise it, creating a "Living Topology of Trust."

If an agent, for instance, suddenly attempts to access a high-value database that is outside its usual "behavioral baseline," the ISPM engine can automatically revoke its credentials or force a human-in-the-loop verification. This is achieved through **Dynamic Entitlements**, which adjust an agent's permissions on the fly based on the specific task it is performing. This "Just-In-Time" (JIT) identity model is essential for preventing **Agent Hijacking** and prompt-injection-based data exfiltration. The framework also supports Contextual Authentication, where the agent must provide a "Proof of Task" before being granted elevated privileges.

Furthermore, the ISPM engine leverages Behavioral Fingerprinting. Just as humans have typing patterns, AI agents have unique "Execution Patterns"—the specific sequence and timing of API calls they make. By building a baseline of these patterns, Cisco and Reco can detect "Impersonation Attacks" where a malicious actor attempts to use a legitimate agent's credentials but exhibits different execution logic.

Technical Insight: The "Identity Blast Radius"

The Cisco-Reco framework introduces a new metric: the Identity Blast Radius. By analyzing the interconnected permissions of an AI agent, the platform calculates the potential damage if that agent were compromised. Security teams can then use Agentic Hardening techniques to automatically prune unused permissions, reducing the blast radius by up to 85% in typical production environments. In one pilot study, a financial services firm reduced their critical data exposure by 40% simply by applying "Least-Privilege Agency" to their internal research bots.

Securing the Agent Supply Chain

Another critical aspect of the framework is **Agent Provenance**. In a world where agents are often composed of third-party "skills" and "tools," how do you know you can trust the code running inside your firewall? Cisco and Reco are advocating for a standardized **Identity BOM** (ID-BOM), a manifest that cryptographically links every component of an agent to its authorized identity. This manifest includes the model version, the prompt templates used, and the third-party libraries integrated into the agent's logic.

This ID-BOM is verified at the network edge by **Cisco Secure Firewall** instances. Any agent attempting to enter the network without a valid ID-BOM is quarantined in a **Wasm-based sandbox** (WebAssembly), where its behavior can be audited by an "Overseer Agent" before it is granted access to live production data. This multi-layered defense-in-depth is the gold standard for **Agentic DevSecOps**, ensuring that the software supply chain is secured from the moment an agent is "born" to the moment it executes its final command.

The framework also introduces Agentic Attestation. Periodically, an agent must "prove" its integrity to a central governance server. If the agent's internal state has been tampered with—perhaps through a subtle prompt injection that changed its goal state—the attestation will fail, and the agent's network access will be instantly severed. This "Continuous Verification" model is the ultimate realization of Zero Trust for the AI era.

The Governance Dashboard: Visualizing Autonomous Risk

One of the biggest hurdles for CISOs is the lack of visibility into AI agent activity. The Cisco-Reco framework provides a unified **Agentic Governance Dashboard**. This dashboard visualizes the "Social Graph" of agents—showing which agents are talking to each other, what data they are consuming, and which business processes they are influencing. It highlights "Hot Spots" where high-risk agents are concentrated and provides "What-If" simulations to predict the impact of a potential breach.

The dashboard also integrates with AskBigID GPT for data-aware security. If an agent is accessing data that BigID has classified as "Highly Sensitive," the dashboard will automatically elevate its risk score and trigger a more rigorous monitoring policy. This synergy between data governance and identity governance is the future of enterprise cybersecurity.

Conclusion: The Future is Autonomous, But Governed

As we march toward the "Agentic Enterprise," the old models of security are no longer sufficient. The collaboration between Cisco and Reco represents a proactive shift toward a world where identity is not just a checkbox, but a continuous, intelligent conversation between the network and the autonomous systems that reside within it. By implementing the **Agentic Security** framework, organizations can finally embrace the velocity of AI without sacrificing the integrity of their most sensitive data.

The era of "Shadow AI" is coming to an end. With the Cisco-Reco framework, IT leaders can bring agents into the fold of corporate governance, turning them from a source of risk into a source of unprecedented productivity. The "Identity Gap" is closing, and the foundation for a secure, autonomous future has finally been laid.

Scaling your AI Identity Strategy?

Download the Gartner 2026 Identity Report and learn how to secure your non-human workforce.

View Trends →