Your AI Agents Have Keys to the Kingdom. Do You Know Which Ones?

by

Why JupiterOne built AI Attack Surface Management — and why it matters right now.

In April 2026, a compromised third-party AI tool pivoted through an employee's Google Workspace, moved laterally into internal systems, and accessed customer secrets. The Vercel breach wasn't exotic. It was a service account with too much access — the same problem security teams have dealt with for years. Except this time, the service account was an AI agent. An AI agent reasons, chains tool calls and decides on its own which systems to touch next. Same identity layer. Different blast radius. In most environments today, no one on the security team can tell you the agent exists, what it can reach or who owns it.

That breach is the reason we built AI Attack Surface Management (AI ASM).

The problem hiding in plain sight

Every AI agent authenticates as a non-human identity. Every copilot holds OAuth scopes. Every MCP server runs under a service account. Your identity tools see them, but they look like every other service account in the environment — indistinguishable from the thousands of API keys and machine credentials your teams already manage.

The scale and numbers are striking. Non-human identities outnumber human ones by 45 to 1 in a typical enterprise. 97% have excessive privileges. And the AI layer is growing fastest of all — yet only 22% of organizations treat AI agents as independent, identity-bearing entities that need their own governance.

Security teams today can't answer three questions that boards, regulators, and incident responders are starting to ask: What AI is actually running in our environment? What can it access? And what happens if it's compromised?

Why now

Three forces are converging.

The AI agent explosion is real. More than 80% of enterprises are past the planning phase with AI agents. But only 14% of those agents went live with security team approval. Development teams provisioned service accounts because proper identity setup felt like friction. OAuth scopes got over-provisioned because demos needed to work before sprints ended. Nobody wrote revocation policies because the first priority was getting agents to function at all. The result is an AI attack surface that grew organically, without oversight, and is now operating in production.

The regulatory clock is ticking. The EU AI Act's Article 4 — requiring AI literacy and auditable AI inventories — takes effect in August 2026. DORA is already live. NIS2 is in force. A single AI agent incident can now trigger simultaneous reporting obligations under three regulatory regimes. Enterprises operating in or serving the EU need to demonstrate they know what AI is running and how it's governed. The compliance question isn't theoretical anymore.

The market has validated the category. In the past twelve months, Cisco acquired Astrix Security for $400 million, CrowdStrike acquired SGNL for $740 million, and Palo Alto Networks acquired CyberArk for $25 billion. Every major platform vendor is racing to own identity security for the AI era. The NHI security market hit $11 billion in 2025 and is projected to reach nearly $39 billion by 2036. This isn't a niche — it's the next infrastructure layer.

What AI Attack Surface Management does

JupiterOne AI ASM answers those three questions — what AI is running, what it can access, and what happens if it's compromised — by building on the thing that makes JupiterOne different: the graph.

Deterministic AI detection across your existing stack. AI ASM doesn't require new agents, new connectors, or a rip-and-replace. It classifies the identities JupiterOne already ingests from 200+ integrations, then applies a curated AI platform catalogue to distinguish AI-powered identities from standard service accounts. You get a definitive answer to "which of our NHIs are AI" without deploying anything new.

Blast radius you can actually trace. When a CISO asks "what happens if this AI agent is compromised," AI ASM shows the full chain,  from the identity, through the data stores it can reach, to the downstream systems that depend on it. Not a permissions list. A relationship-aware graph that traces access all the way to regulated data. This is the question every board is going to ask after the next AI-related breach, and it's the question nobody else answers today.

Risk scoring that speaks the language of regulation. AI ASM scores every AI identity using a weighted model that factors in EU AI Act classification, data sensitivity, access volume, credential hygiene, and documentation status. A CISO can filter to "show me every high-risk AI identity accessing restricted data without a DPIA" in a single view. This is audit evidence,  not simply posture management.

Governance that closes the loop. Discovery without action is noise. AI ASM includes ownership assignment, attestation workflows, and credential lifecycle management so that the 91% of orphaned tokens and the 97% of over-privileged NHIs become something your team can actually remediate, not just report on.

What this means for security teams

If you're a CISO, AI ASM gives you a board-ready view of your organization's AI exposure. See your aggregate posture, regulatory readiness, and blast radius visibility  without commissioning a manual audit every quarter.

If you're a security analyst, you get the ability to investigate AI-powered identities with the same depth you bring to any other security finding: who owns it, what it can reach, when it was last active, and whether its credentials are current.

If you're responsible for identity governance, you finally get NHI lifecycle management that scales — not a spreadsheet of service accounts, but an automated inventory with ownership, attestation, and rotation enforcement built in.

Why JupiterOne is perfectly suited to solve this challenge 

JupiterOne's graph was built for exactly this problem. We already map relationships among identities, data, and infrastructure across every major cloud and SaaS platform, plus on-prem managed infrastructure and services. AI ASM extends that graph into the fastest-growing identity risk vector,  turning data we already ingest into the AI attack surface visibility that no one else can provide at this breadth.

AI ASM is going GA on June 16. If you're a JupiterOne customer, it'll be  in your environment soon so you can  start exploring your AI identity posture. If you're not yet a customer, request a demo to see what your AI attack surface actually looks like.

James Mountifield

Keep Reading

The Vulnerability Management Industrial Complex | JupiterOne
May 13, 2026
Blog
The Vulnerability Management Industrial Complex

In 2020, average time to remediate a vulnerability was 171 days. Today it's 252 — and AI just collapsed time-to-exploit to nine hours. A long-form argument that the V

Meet the New JupiterOne: AI ASM + UVM Launch | JupiterOne
May 13, 2026
Blog
SAY HI TO THE NEW JUPITERONE AND OUR NEW PRODUCTS

Today we're launching the new JupiterOne — a refreshed AI Risk Management Platform plus two products our customers asked us to build: AI Attack Surface Management and

JupiterOne Blog | Project Glasswing Proves That "Just Patch the Criticals" Is Dead. Here's What Comes Next.
April 8, 2026
Blog
Project Glasswing Proves That "Just Patch the Criticals" Is Dead. Here's What Comes Next.

Anthropic's Project Glasswing has shown that AI can now chain together vulnerabilities and exploit software faster than almost any human. That changes everything.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

{ "@context": "https://schema.org", "@type": "FAQPage", "mainEntity": [ { "@type": "Question", "name": "What is JupiterOne AI Attack Surface Management?", "acceptedAnswer": { "@type": "Answer", "text": "JupiterOne AI Attack Surface Management (AI ASM) is a security product that discovers, classifies, and governs AI agents and AI-powered identities across enterprise environments. It uses JupiterOne's native graph to map every AI agent's blast radius — the data stores it can reach, the systems it depends on, and the regulated data it touches." } }, { "@type": "Question", "name": "How are AI agents different from regular service accounts?", "acceptedAnswer": { "@type": "Answer", "text": "AI agents authenticate as non-human identities (NHIs) using the same OAuth scopes, service accounts, and API keys as standard machine credentials. The difference is that AI agents reason, chain tool calls, and decide which systems to touch next on their own — creating a much larger potential blast radius than a typical service account." } }, { "@type": "Question", "name": "What is the blast radius of a compromised AI agent?", "acceptedAnswer": { "@type": "Answer", "text": "The blast radius of a compromised AI agent is the full chain of systems it can reach: every data store, downstream service, identity it can assume, and regulated data it touches. JupiterOne AI ASM traces this as a relationship-aware graph rather than a static permissions list, so security teams can answer what actually happens if a specific AI agent is compromised." } }, { "@type": "Question", "name": "How many non-human identities does a typical enterprise have?", "acceptedAnswer": { "@type": "Answer", "text": "Non-human identities outnumber human identities by 45 to 1 in a typical enterprise, and 97% of NHIs have excessive privileges. Only 22% of organizations currently treat AI agents as independent, identity-bearing entities that need their own governance, leaving most enterprises with significant blind spots." } }, { "@type": "Question", "name": "How does AI ASM detect AI agents in existing environments?", "acceptedAnswer": { "@type": "Answer", "text": "AI ASM doesn't require new agents, new connectors, or a rip-and-replace. It classifies the identities JupiterOne already ingests from 200+ integrations and applies a curated AI platform catalogue to distinguish AI-powered identities from standard service accounts — giving a definitive answer to which NHIs are AI without deploying anything new." } }, { "@type": "Question", "name": "When will JupiterOne AI ASM be generally available?", "acceptedAnswer": { "@type": "Answer", "text": "JupiterOne AI Attack Surface Management is going GA on June 16, 2026. Existing JupiterOne customers will see AI ASM in their environment automatically and can start exploring their AI identity posture. New prospects can request a demo to see what their AI attack surface looks like." } }, { "@type": "Question", "name": "What regulations require AI inventory and governance?", "acceptedAnswer": { "@type": "Answer", "text": "The EU AI Act's Article 4 — requiring AI literacy and auditable AI inventories — takes effect in August 2026. DORA is already in force, as is NIS2. A single AI agent incident can now trigger simultaneous reporting obligations under multiple regulatory regimes for enterprises operating in or serving the EU." } } ] }