Cisco in February announced AgenticOps for Security, an autonomous security operations platform that can rewrite firewall rules and modify IAM policies without human intervention. The platform represents a significant escalation from current AI security tools, which primarily read data, to systems with write access to critical infrastructure.
According to Cisco’s announcement, AgenticOps includes autonomous firewall remediation and PCI-DSS compliance capabilities. The system operates through approved API calls that endpoint detection and response (EDR) tools classify as authorized activity, potentially masking malicious actions if the agent becomes compromised.
Rising Threat Landscape for AI Security Tools
Adversaries successfully compromised AI security tools at more than 90 organizations in 2025, according to CrowdStrike’s Global Threat Report. These attacks involved injecting malicious prompts into legitimate AI tools to steal credentials and cryptocurrency.
The compromised tools could read data but lacked write access to infrastructure. Current autonomous SOC agents shipping now possess significantly expanded capabilities, including the ability to rewrite firewall rules, modify IAM policies, and quarantine endpoints using privileged credentials.
“In the agentic era, defending against AI-accelerated adversaries and securing AI systems themselves, require operating at machine speed,” CrowdStrike CEO George Kurtz said.
Competing Platforms Address Security Concerns
Ivanti launched Continuous Compliance and the Neurons AI self-service agent last week with built-in security controls. The platform includes policy enforcement, approval gates, and data context validation designed to address vulnerabilities outlined in the OWASP Agentic Top 10.
The design distinction matters because autonomous agents can execute infrastructure changes through legitimate API calls that bypass traditional security monitoring. A compromised SOC agent could theoretically modify critical security configurations without triggering alerts, since the actions appear as authorized system activity.
Enterprise AI Adoption Accelerates
Microsoft reported that organizations are rapidly moving from AI pilots to production deployments at scale. According to Microsoft’s blog post, customers want “measurable business outcomes, along with security, governance and responsible AI built in from day one.”
Google documented 1,302 real-world generative AI use cases from leading organizations, with the majority showcasing agentic AI applications built with Gemini Enterprise, Security Command Center, and AI Hypercomputer infrastructure.
The rapid deployment of agentic systems across enterprises creates new attack surfaces. Unlike traditional AI tools that process data, autonomous agents can execute privileged operations across infrastructure, from network configuration to access control management.
Security Architecture Challenges
The architectural shift to autonomous agents introduces novel security risks. Traditional security tools monitor human-initiated actions and flag unusual behavior patterns. Autonomous agents operate continuously with elevated privileges, making it difficult to distinguish between legitimate automation and compromised agent activity.
Current endpoint detection systems classify agent API calls as authorized activity, potentially creating blind spots in security monitoring. Organizations deploying autonomous SOC agents must implement additional governance layers to track agent decisions and validate infrastructure changes.
The OWASP Agentic Top 10 documents specific vulnerabilities that emerge when security controls are absent from autonomous systems. These include prompt injection attacks, unauthorized privilege escalation, and uncontrolled infrastructure modifications.
What This Means
The security industry is entering a critical transition period where autonomous agents gain write access to infrastructure faster than security frameworks can adapt. While platforms like Cisco’s AgenticOps offer powerful automation capabilities, they also expand the potential impact of successful attacks.
Organizations must balance the operational benefits of autonomous security agents against the risks of compromised systems with elevated privileges. The distinction between platforms with built-in security controls versus those requiring external governance will likely determine adoption patterns.
The documented compromise of 90+ AI security tools in 2025 serves as a preview of threats facing more powerful autonomous agents. Security teams need new monitoring approaches that can distinguish between legitimate agent actions and malicious activity executed through compromised systems.
FAQ
What makes autonomous SOC agents different from current AI security tools?
Autonomous SOC agents have write access to infrastructure, allowing them to modify firewall rules, IAM policies, and endpoint configurations. Previous AI security tools could only read data and generate alerts for human review.
How do compromised autonomous agents evade detection?
Compromised agents execute malicious actions through legitimate API calls using their assigned privileges. Endpoint detection systems classify these as authorized activity, making it difficult to identify when an agent has been compromised and is acting maliciously.
What security measures should organizations implement for autonomous agents?
Organizations should deploy platforms with built-in policy enforcement, approval gates, and data context validation. Additional monitoring systems should track agent decisions and validate infrastructure changes against organizational policies and baseline configurations.






