Skip to main content Skip to footer

Blog

AI agents in cloud environments—security essentials

5-MINUTE READ

May 5, 2025

As AI agents increasingly take the reins, transforming manual processes into autonomous ones, a new wave of security challenges is on the horizon. According to recent research by Accenture, Making Reinvention Real with Gen AI, agentic architecture, which involves AI agents capable of reimagining entire workflows, is set to become mainstream in 2025. This shift is significant, with 3x as many organizations planning to invest in these capabilities compared to 2024[1]. This surge underscores the pivotal role AI agents will play in driving rapid innovation across industries.

While AI agents offer substantial benefits, such as reducing manual intervention and boosting efficiency, they also introduce new vulnerabilities and risks.

The question remains: How can organizations ensure their technology ecosystem is ready to harness the advanced capabilities of AI agents while maintaining robust security?

In our first blog from this series, we introduced Accenture’s AI Agent Zero Trust Model for Cyber Resilience, designed to enhance cybersecurity across various industries (Figure 1). This model is built on the fundamental principle of "Trust Nothing, Verify Everything," which ensures that every element within an organization's network is continuously validated. While the first blog delved into Secured Identity & Access Management, this installment will focus on the Secured Workflow and Secured AI Runtime, with a particular emphasis on secured cloud environments.

The image shows a figure of Accenture’s Security, how AI Agent Zero Trust Model fits into Autonomous Agents and Secured AI Agents, and how the process can help scale business applications.
The image shows a figure of Accenture’s Security, how AI Agent Zero Trust Model fits into Autonomous Agents and Secured AI Agents, and how the process can help scale business applications.

Figure 1. Accenture’s AI Agent Zero Trust Model for Cyber Resilience

Navigating the cloud security landscape

A modern approach to cloud security goes beyond traditional firewalls and segmentation. It's about building an ecosystem that learns, adapts and outthinks AI-powered threats. In a domain where threats evolve rapidly, complacency is not an option. It's time to be proactive.

To effectively secure cloud environments, it is essential to consider two key perspectives: the readiness of the cloud to support AI agents and the utilization of AI agents to enhance cloud security. By adopting this hybrid approach, organizations can move away from reactive security measures and implement "Security by Design" principles more effectively.

Preparing the cloud for safe AI operations

The first perspective focuses on how cloud must be equipped to handle AI agents securely. As AI becomes more prevalent, cloud environments must ensure that they are designed to accommodate these advanced technologies without compromising security. This involves several key considerations:

  • Building scalable, high-performance foundations: AI workloads demand an elastic infrastructure that can efficiently manage unpredictable spikes in compute demand. By implementing such a flexible and responsive cloud environment, organizations can support the complex and varying requirements of AI applications without compromising on speed or efficiency.

  • Establishing intelligent data ecosystems: AI thrives on high-quality data, but most organizations face challenges due to fragmented data lakes. To overcome this, it's essential to create unified data environments in the cloud that integrate and centralize data from various sources, ensuring consistency and accessibility. This unified approach not only enhances data quality but also streamlines the data management process, making it easier to leverage AI effectively.

  • Embedding security throughout the AI lifecycle: traditional security models often struggle to keep up with the dynamic nature of AI. As organizations race to embrace emerging technologies, they often prioritize speed over security. Our Securing the Digital Core report indicates that seven in 10 executives say they implement security controls only for critical functions or deploy it after transformation is finalized and vulnerabilities are detected. This exposes the entire environment to significant vulnerability. Implementing real-time threat detection, automated response mechanisms and comprehensive monitoring ensures that AI applications remain secure and compliant at every stage of their development and deployment.

Leveraging AI agents for enhanced cloud security

The second perspective involves using AI agents to bolster cloud security. AI's capabilities in pattern recognition, anomaly detection and predictive analytics make it a powerful tool for identifying and mitigating security threats. Here are some ways AI can be leveraged:

  • AI-driven threat detection and response: AI-driven threat detection and response systems are revolutionizing cloud security. These solutions excel in real-time anomaly detection, identifying unusual patterns that might indicate a security breach. For example, AI can help automate responses to threats such as code injections and data leaks, tasks that traditionally relied on Web Application Firewalls (WAFs). By automating these responses, AI agents can significantly improve the speed and effectiveness of threat mitigation.

  • Securing non-human identities in the cloud: The use of APIs and container/serverless models is on the rise in cloud environments, making the security of non-human identities such as service accounts, bots or machine users, increasingly important. AI agents can play a crucial role in improving the security of these identities. For example, multifactor authentication (MFA) and conditional access policies should be applied to AI infrastructure, ensuring that AI agents re-authenticate frequently. This approach helps prevent unauthorized access and privilege escalation.

  • Safeguarding AI data integrity: As AI agents become more prevalent in the cloud, safeguarding the integrity of AI data becomes paramount. Memory protection and file integrity monitoring are essential to defend against data poisoning and control. Organizations must also continuously scan for unauthorized AI models and train teams to quickly flag and address "rogue agents." Tools like Wiz can be instrumental in this process, providing comprehensive visibility into AI activities.

  • Investing in AI-powered SIEM tools: Investing in AI-powered Security Information and Event Management (SIEM) tools, such as CrowdStrike, is another critical step. These tools can parse billions of logs to identify patterns that humans might miss, providing valuable insights into potential security threats. By integrating them into the cloud ecosystem, organizations can enhance their ability to detect and respond to AI-specific threats.

Securing cloud environments in the age of AI requires a comprehensive approach that addresses both the infrastructure's readiness to support AI agents and the strategic use of AI to enhance security. By focusing on these two perspectives, organizations can build a robust and resilient cloud ecosystem that leverages the power of AI while maintaining the highest standards of security. 

Strategies for AI agent security in cloud

To effectively balance the benefits and risks of AI agents, cloud environments must adopt secured workflows tailored specifically for AI agents. Here are the top three immediate actions that can be taken to enhance security in this evolving landscape:

  1. Isolation and control

    One of the primary concerns with AI agents is the risk of AI escape and unauthorized access. To address this, it is crucial to ensure effective isolation of AI agents. This can be achieved by implementing specific runtimes with dynamic lifecycles to manage AI-generated code. These runtimes should be designed to operate in isolated environments, preventing any unintended interactions with other systems.

    Additionally, strict controls must be enforced on CPU, memory, network and file system access. Sandboxing techniques can be particularly effective in this regard, as they provide a secure, controlled environment where AI agents can operate without posing a risk to the broader system. By limiting the resources and capabilities available to AI agents, organizations can significantly reduce the potential for misuse or malicious activity. Organizations need to also identify technical and procedural “kill switches” which can be used to disable agents that have drifted or become compromised.

  2. Identity governance

    Another critical aspect of securing AI agents in cloud environments is identity governance. Traditional cloud security measures often focus on human users, but AI agents require a different approach. Implementing strong non-human identity governance frameworks is essential to prevent privilege escalation and identity issues.

    These frameworks should include robust authentication mechanisms to ensure that only authorized AI agents can access the necessary resources. Secure API access controls are also crucial, as they help prevent unauthorized access to sensitive data and systems. Detailed document access controls should be put in place to limit AI access to authorized content, ensuring that AI agents can only interact with the data and resources they are explicitly permitted to use.

  3. Continuous monitoring

    Continuous monitoring is a cornerstone of effective cloud security, and it becomes even more critical when dealing with AI agents. Advanced monitoring tools can help detect behavioral anomalies, identify potential hijacking attempts and limit AI-specific attacks. These tools should be tailored to the unique characteristics of AI agents, such as their ability to generate and control data in real-time.

    Comprehensive threat modeling and security frameworks, such as Maestro, can provide a structured approach to addressing AI-specific threats. These frameworks should cover a range of potential risks, including contextual data manipulation, tool exploitation and fabricated output distortion. By continuously monitoring AI agents and their activities, organizations can quickly identify and respond to any suspicious behavior, ensuring that the cloud environment remains secure.

Secure your cloud future

As AI agents continue to play a more significant role in cloud management, it is imperative to adopt a proactive approach to security. By focusing on isolation and control, identity governance and continuous monitoring, organizations can effectively mitigate the risks associated with AI in the cloud and ensure that their systems remain secure and reliable. The future of cloud security is bright, but it requires a strategic and multifaceted approach to harness the full potential of AI while safeguarding against emerging threats.

Sources

1 Making reinvention real with gen AI Report

WRITTEN BY

Naynesh Patel

Managing Director – Global Cloud & Application Security

Daniel Kendzior

Managing Director – Global Data & AI Security Lead