AI Agents in Action Foundations for Evaluation and Governance 2025

Page 11 of 34 · WEF_AI_Agents_in_Action_Foundations_for_Evaluation_and_Governance_2025.pdf

As AI agents move into enterprise and consumer- facing environments, they extend rather than replace existing security challenges. Security strategies have evolved from perimeter defences to layered “defence in depth,” and more recently to the zero-trust model.10 These changes reflect broader transformations such as cloud adoption, distributed workforces and interconnected ecosystems, all of which have already weakened the notion of a clear boundary between internal and external networks. Agents build on this trajectory but add additional layers of risk that must be managed proactively. By autonomously invoking tools and communicating across organizational lines (e.g. via MCP and A2A), agents embed external services, databases and peer agents into enterprise workflows. This multiplication of identities and connections makes identity management, micro-segmentation and ongoing verification of agent activity essential. While protocols such as MCP and A2A can streamline integration, they also expand the attack surface11 by introducing new external dependencies and interfaces, as illustrated in Figure 2. The very interoperability that enhances agent capabilities also exposes enterprises to unpredictable inputs and vulnerabilities from third parties. For adopters, this means that every agent interaction should be treated as untrusted by default, and that verifying identity, permissions and context is necessary before granting access. Finally, agents can be misused.12 They might be exploited through design flaws or prompt injections, or even intentionally deployed for malicious purposes, such as accessing private data or spreading misinformation. Unlike traditional attacks, autonomous agents can act with speed and persistence, making attribution and accountability harder. Organizations should prepare for this by implementing strong audit trails, incident response plans and clear accountability structures.1.3 Cybersecurity considerations Security strategies have evolved from perimeter defences to layered “defence in depth” and more recently to the zero-trust model. AI Agents in Action: Foundations for Evaluation and Governance 11
Ask AI what this page says about a topic: