AI Agents Need Guardrails to Ensure Security

In the race to harness the power of artificial intelligence, enterprises are eagerly deploying autonomous AI agents, hoping for a revolution in productivity. Yet, this gold rush comes with a dark side—a world of shadow AI, black-box decision-making, and accountability vacuums that can quickly turn into an SRE’s worst nightmare. We’re joined by Dominic Jainy, an IT professional with deep expertise in applying AI, machine learning, and blockchain in complex corporate environments. He’s here to cut through the hype and discuss the critical guardrails organizations must build to ensure these powerful new tools facilitate speed and security, rather than chaos. We’ll explore why so many early adopters regret their initial haste, how to establish a strong governance foundation, and what true human-in-the-loop oversight looks like in practice.

You note that four-in-ten leaders regret lacking a strong governance foundation from the start. Beyond just forming a committee, what specific policies and best practices did they likely overlook, and what first steps can an organization take to establish this foundation before wide-scale deployment?

That statistic is incredibly telling, isn’t it? The regret stems from treating AI agent adoption like a standard software update when it’s more like onboarding a new class of employee with unique capabilities and risks. They jumped straight to deployment, completely overlooking the foundational policies. They likely never defined what “high-impact” even means for an agent’s action, failed to create clear data-access policies, and didn’t establish an approval matrix for who can authorize an agent to operate on critical systems. The first step isn’t to write a 100-page governance bible. It’s to gather a small, cross-functional team—IT security, legal, and a key business unit—and draft a simple, one-page charter. This document should outline the initial, conservative use cases, define the human owner for each agent, and explicitly state that human oversight is the non-negotiable default.

The article identifies shadow AI as a key risk amplified by agent autonomy. Instead of simply blocking unsanctioned tools, what specific processes for experimentation can IT create, and could you share an example of how this successfully channels innovation while maintaining security and oversight?

The old IT playbook of simply blocking everything is a losing battle; it just pushes shadow AI deeper into the shadows where it’s far more dangerous. The modern approach is to build a sanctioned “sandbox.” This is an isolated environment where employees can experiment with new AI tools using non-sensitive, anonymized company data. For instance, we saw a marketing team that wanted to use a new, unsanctioned agent for campaign optimization. Instead of a hard “no,” IT gave them access to the sandbox with dummy customer data. The team was able to prove the tool’s value over two months. After a thorough security review of the tool in that controlled setting, IT developed a secure pathway to integrate it into the main system. This transforms IT from a gatekeeper into a strategic partner, fostering a culture of safe innovation instead of risky workarounds.

You recommend making human oversight the default, with a specific owner for each agent. Can you describe what this accountability looks like in daily operations? For instance, please walk us through the step-by-step approval path for a high-impact action an AI agent might propose.

Absolutely. Let’s imagine an AI agent managing supply chain logistics proposes rerouting a massive shipment of components due to predicted weather delays, an action that would cost thousands but potentially save millions. First, the agent’s proposal is automatically flagged as “high-impact” based on predefined cost and operational thresholds. This immediately triggers a notification, not to a generic inbox, but directly to the designated human owner—the Director of Logistics. This notification includes the agent’s full reasoning, the data sources it used for the weather prediction, and the projected financial impact. The Director can then review this logic, perhaps cross-reference it with another data source, and make the final call with a simple “approve” or “deny” button. The agent proposes and provides the evidence, but the human with the institutional knowledge and ultimate accountability makes the decision. This ensures autonomy doesn’t become unchecked authority.

For “baking in security,” you advise aligning an agent’s permissions with its human owner’s scope. How does this work on a practical level? Could you detail the process for setting these permissions and explain why complete action logs are so critical for incident response?

On a practical level, this is about treating the AI agent as a digital proxy for its human owner. We use role-based access control, or RBAC. When an agent is assigned to a financial analyst, its digital identity inherits the exact same permissions as that analyst. It can access the financial reporting systems but is blocked from touching HR records or production codebases. The process involves IT mapping the agent’s function to an existing human role and then locking its API keys and credentials to that profile. Any request for expanded permissions must go through the same rigorous approval process a human employee would face. Complete action logs are the flight recorder for your AI systems. When an incident occurs—say, an agent deletes the wrong database table—those logs are your only way to trace what happened. They show the exact command, the timestamp, and the logic trail that led to the error. Without them, you’re just staring at the wreckage with no idea how the crash happened, turning a minutes-long fix into a days-long forensic nightmare.

To avoid a “black box” scenario, you stress making agent outputs explainable. What key data points should be logged to show an agent’s decision-making context, and can you provide an anecdote where access to these traces helped an engineering team quickly resolve a serious issue?

To truly avoid a black box, you must log the entire decision-making chain of custody. This includes the initial goal or prompt given to the agent, the specific internal and external data sources it queried, the intermediate steps or “thoughts” it generated, and, of course, the final action it took. I recall an incident where an inventory management agent suddenly ordered a massive surplus of a slow-moving product. It looked like a catastrophic failure. But because the team had full traceability, they dove into the logs. They saw the agent had correctly interpreted its goal to “prevent stockouts,” but it had queried a sales forecast database right as a new, unvalidated, and wildly optimistic forecast was being uploaded by a junior analyst. The logs proved the agent’s logic was sound; the input data was flawed. This insight allowed them to fix the data ingestion process and add a rule requiring human validation for forecasts showing more than a 20% variance, resolving the root cause in under an hour instead of days spent wrongly debugging the agent itself.

What is your forecast for the evolution of AI agent autonomy in the enterprise over the next two years?

Over the next two years, I believe we’ll see a significant shift from the current “Wild West” of fragmented, single-task agents to the rise of integrated agentic platforms. The initial excitement of deploying a standalone agent to do one thing well will be replaced by the strategic need to orchestrate teams of agents to automate complex, end-to-end business processes. Consequently, the focus will move from pure capability to enterprise-grade governance. Companies will stop asking “Can an AI do this?” and start demanding platforms that offer built-in security, compliance, audit trails, and centralized human oversight. Autonomy will undoubtedly increase, but it will be a more mature, observable, and accountable form of autonomy, managed through robust frameworks rather than ad-hoc deployments.

Explore more

How Companies Can Fix the 2026 AI Customer Experience Crisis

The frustration of spending twenty minutes trapped in a digital labyrinth only to have a chatbot claim it does not understand basic English has become the defining failure of modern corporate strategy. When a customer navigates a complex self-service menu only to be told the system lacks the capacity to assist, the immediate consequence is not merely annoyance; it is

Customer Experience Must Shift From Philosophy to Operations

The decorative posters that once adorned corporate hallways with platitudes about customer-centricity are finally being replaced by the cold, hard reality of operational spreadsheets and real-time performance data. This paradox suggests a grim reality for modern business leaders: the traditional approach to customer experience isn’t just stalled; it is actively failing to meet the demands of a high-stakes economy. Organizations

Strategies and Tools for the 2026 DevSecOps Landscape

The persistent tension between rapid software deployment and the necessity for impenetrable security protocols has fundamentally reshaped how digital architectures are constructed and maintained within the contemporary technological environment. As organizations grapple with the reality of constant delivery cycles, the old ways of protecting data and infrastructure are proving insufficient. In the current era, where the gap between code commit

Observability Transforms Continuous Testing in Cloud DevOps

Software engineering teams often wake up to the harsh reality that a pristine green dashboard in the staging environment offers zero protection against a catastrophic failure in the live production cloud. This disconnect represents a fundamental shift in the digital landscape where the “it worked in staging” excuse has become a relic of a simpler era. Despite a suite of

The Shift From Account-Based to Agent-Based Marketing

Modern B2B procurement cycles are no longer initiated by human executives browsing LinkedIn or attending trade shows but by autonomous digital researchers that process millions of data points in seconds. These digital intermediaries act as tireless gatekeepers, sifting through white papers, technical documentation, and peer reviews long before a human decision-maker ever sees a branded slide deck. The transition from