Skip to content
WWT LogoWWT Logo Text (Dark)WWT Logo Text (Light)
The ATC
Ctrl K
Ctrl K
Log in
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
What we do
Our capabilities
AI & DataAutomationCloudConsulting & EngineeringData CenterDigitalImplementation ServicesIT Spend OptimizationLab HostingMobilityNetworkingSecurityStrategic ResourcingSupply Chain & Integration
Industries
EnergyFinancial ServicesGlobal Service ProviderHealthcareLife SciencesManufacturingPublic SectorRetailUtilities
Learn from us
Hands on
AI Proving GroundCyber RangeLabs & Learning
Insights
ArticlesBlogCase StudiesPodcastsResearchWWT Presents
Come together
CommunitiesEvents
Who we are
Our organization
About UsOur LeadershipLocationsSustainabilityNewsroom
Join the team
All CareersCareers in AmericaAsia Pacific CareersEMEA CareersInternship Program
Our partners
Strategic partners
CiscoDell TechnologiesHewlett Packard EnterpriseNetAppF5IntelNVIDIAMicrosoftPalo Alto NetworksAWSGoogle CloudVMware
The ATC
AI Assistants and AgentsResearchAI SecurityResearch NoteATCIdentity and Access ManagementSecurity
WWT Research • Research Note
• March 4, 2026 • 7 minute read

Identity Management for AI Agents: The Infrastructure That Unlocks Scale

As agents scale, questions of accountability, authorization and oversight move from theoretical to existential. This article explores why identity infrastructure has become the hidden bottleneck to scaling agentic AI, and why governance isn't slowing innovation — it's what makes it possible.

In this report

  1. Why this wasn't a problem before
  2. Three questions your board will ask
    1. What is this agent authorized to do?
    2. Who's accountable when something goes wrong?
    3. How do we know what it actually did? 
  3. What we've seen work
  4. The investment frame
  5. Sources

Your AI pilot worked. The fraud detection agent caught patterns your rules-based system missed. The clinical assistant reduced documentation time by 40%. The board approved expansion.

Then someone asked a reasonable question: If this agent makes a mistake, who's accountable? 

In the pilot, the answer was easy. A small team owned it, scope was limited and everyone understood what the system could access. At enterprise scale, that clarity disappears. The AI assistant that worked beautifully for ten physicians becomes a governance issue when deployed to ten thousand. The trading algorithm that impressed the innovation team raises compliance concerns when it's executing across multiple desks.

Many organizations are stuck in exactly this spot. AI initiatives that proved their value in controlled settings are now stalled because no one can answer basic questions about authorization, accountability and oversight at scale.

The bottleneck isn't the AI. It's identity infrastructure.

This isn't just a practitioner observation. Gartner's Top Trends in Cybersecurity for 2026 report puts the issue front and center, highlighting the need for identity and access management (IAM) to secure and enable AI agents, along with the growing demand for stronger program oversight of agentic AI, as defining challenges for security leaders this year. It's validation of what we've observed firsthand: Identity infrastructure is where AI ambition meets operational reality.

Why this wasn't a problem before

Traditional automation was predictable. Scripts executed defined tasks with fixed permissions. If something went wrong, you could trace it to a specific process running under a specific service account.

AI agents operate differently. They make decisions. They access multiple systems based on context. They act on behalf of humans in situations that shift in real time. Forrester's 2025 analysis captures the challenge well: AI agents "combine characteristics of both machine and human identities," requiring governance frameworks that most organizations simply haven't built yet.

The scale compounds fast. IDC research notes that where a human employee might call a handful of APIs in a workflow, an AI agent may call hundreds. Analysts describe this as a "flywheel effect" on access requests. For context, Gartner estimates a 1:45 ratio of human to machine identities in the average enterprise; CyberArk reports that the reality in many organizations exceeds even that. Every one of those calls is a permission decision, an audit event or a potential governance question.

Most identity systems were designed for a world where access was granted to people, reviewed annually and assumed to be relatively static. That model breaks when you're provisioning agents that might exist for hours, operate autonomously and spawn sub-processes to complete tasks.

Three questions your board will ask

Deploying AI agents at scale changes your enterprise risk profile. Not dramatically, but meaningfully. Leadership will want to know whether existing controls still match the new exposure. That's not resistance to AI. It's the conversation any significant operational change should trigger: What's different now, and what are we doing about it?

Organizations that can answer clearly will move forward. Those that can't will stall.

What is this agent authorized to do?

The question isn't what the agent is designed to do, but what it is actually permitted to do. This requires fine-grained authorization tied to context. For example, this agent can access these records, for this patient, during this clinical encounter. Role-based permissions that grant broad access won't cut it. The technology already exists (it's used in healthcare for human-to-human delegation), but most organizations haven't extended it to AI systems.

Who's accountable when something goes wrong?

When an AI agent acts on behalf of a portfolio manager or physician, the accountability chain needs to be unambiguous. This means proper delegation frameworks, not credential sharing where agents use human logins to access systems. Credential sharing breaks audit trails, creates legal exposure and makes it nearly impossible to answer this question cleanly. Gartner's research flags it as one of the highest-risk patterns in early AI deployments.

How do we know what it actually did? 

Full observability means every agent action is tied to an identity, with audit trails that can reconstruct exactly what happened and why. This isn't just for incident response. It's what allows you to demonstrate to regulators that your AI systems are operating within bounds. The NIST Cybersecurity Framework's new AI profile, published in draft form in December 2025, treats AI agents as "actors within the environment" requiring the same identity controls and audit capabilities as any other system component.

What we've seen work

In our work with financial services, healthcare and energy organizations, a pattern has emerged. The teams that scale AI successfully aren't the ones with the most sophisticated models; they're the ones that treat identity infrastructure as a prerequisite, not an afterthought.

DBS Bank offers a useful reference point. They operate over 800 AI models across 350 use cases and have reduced AI project timelines from 15 months to under 3 months, all while maintaining governance integrity. The key wasn't moving faster by cutting corners on oversight. It was building identity and governance capabilities that could keep pace with deployment speed.

The organizations struggling to scale typically share a common gap. They're trying to govern AI agents with identity systems designed for a different era with annual access reviews, static role assignments and annual provisioning workflows. These approaches create friction that compounds with every new agent deployment. Eventually, the friction wins. Projects stall in governance review, security teams lack visibility and expansion gets deferred.

The fix isn't complicated in concept. It includes automated lifecycle management, dynamic authorization, short-lived credentials and comprehensive audit trails. Leading IAM platforms already support these capabilities. The real work is implementation and integration, connecting identity infrastructure to AI development pipelines so governance happens at deployment speed.

The investment frame

IAM investment for AI readiness isn't a single-purpose spend. The same infrastructure addresses zero trust architecture requirements, simplifies cloud migration, improves developer productivity and positions organizations for emerging regulatory frameworks like ISO 42001. Forrester projects the IAM market will roughly double to $27.5 billion by 2029, reflecting broad recognition that identity is becoming strategic infrastructure.

But the more important lens is opportunity cost. Every month spent in governance limbo is a month competitors are scaling. Every deferred deployment is productivity left on the table. And without the right controls, scaling itself becomes the risk. The real question for executives isn't whether identity infrastructure is worth the investment, it's whether you can afford to scale AI without it.

The organizations that will capture AI's benefits in regulated industries are building identity capabilities now, before the need becomes urgent. Not because regulators are coming — though they are — but because identity infrastructure is what converts successful pilots into enterprise-wide advantage.

Governance isn't the brake on AI innovation. It's the steering.

World Wide Technology partners with enterprises building identity infrastructure for AI-ready environments. In regulated industries, we've learned that the organizations scaling fastest are the ones that solved governance first. We can help you do the same.

Sources

Gartner, "Top Cybersecurity Trends for 2026," 2026

Forrester, "Privileged Identity Management Solutions Wave," Q3 2025; AEGIS Framework for Agentic AI Security, 2025.

IDC, "IAM 2025: The Rise of the Machines," 2025.

NIST, "Cybersecurity Framework Profile for Artificial Intelligence" (IR 8596 draft), December 2025.

Gartner, "How to Securely Delegate Access From Humans to AI Agents," August 2025.

DBS Bank AI governance documentation and public disclosures (Not a WWT Client)

WWT Research
Insights powered by the ATC

This report may not be copied, reproduced, distributed, republished, downloaded, displayed, posted or transmitted in any form or by any means, including, but not limited to, electronic, mechanical, photocopying, recording, or otherwise, without the prior express written permission of WWT Research.


This report is compiled from surveys WWT Research conducts with clients and internal experts; conversations and engagements with current and prospective clients, partners and original equipment manufacturers (OEMs); and knowledge acquired through lab work in the Advanced Technology Center and real-world client project experience. WWT provides this report "AS-IS" and disclaims all warranties as to the accuracy, completeness or adequacy of the information.

Contributors

Wesley Palmer
Managing Director
Jill Cochrane
VP & General Manager, Solution Security
Jason Lam
Security Practice Director

Contributors

Wesley Palmer
Managing Director
Jill Cochrane
VP & General Manager, Solution Security
Jason Lam
Security Practice Director

In this report

  1. Why this wasn't a problem before
  2. Three questions your board will ask
    1. What is this agent authorized to do?
    2. Who's accountable when something goes wrong?
    3. How do we know what it actually did? 
  3. What we've seen work
  4. The investment frame
  5. Sources
  • About
  • Careers
  • Locations
  • Help Center
  • Sustainability
  • Blog
  • News
  • Press Kit
  • Contact Us
© 2026 World Wide Technology. All Rights Reserved
  • Privacy Policy
  • Acceptable Use Policy
  • Information Security
  • Supplier Management
  • Quality
  • Accessibility
  • Cookies