โ˜๏ธFreshcollected in 27m

Securing AI agents with AWS and Cisco AI Defense

Securing AI agents with AWS and Cisco AI Defense
PostLinkedIn
โ˜๏ธRead original on AWS Machine Learning Blog

๐Ÿ’กDiscover how to secure enterprise AI agent deployments with Cisco and AWS.

โšก 30-Second TL;DR

What Changed

Addresses security challenges in scaling AI agents

Why It Matters

Provides enterprises with a robust framework to deploy AI agents securely, ensuring that agent-to-agent communication remains compliant and monitored.

What To Do Next

Evaluate your current AI agent governance policy against the Cisco and AWS security framework for A2A deployments.

Who should care:Enterprise & Security Teams

๐Ÿง  Deep Insight

Web-grounded analysis with 19 cited sources.

๐Ÿ”‘ Enhanced Key Takeaways

  • โ€ขThe joint solution provides end-to-end security across the entire AI application lifecycle, encompassing development, deployment, and runtime phases, with a focus on continuous validation and protection.
  • โ€ขCisco AI Defense integrates with core AWS AI services, including Amazon Bedrock and SageMaker, to offer automated vulnerability detection and real-time guardrails against AI-specific threats.
  • โ€ขThe partnership directly addresses emerging AI threats such as prompt injection, data poisoning, model manipulation, adversarial attacks, and the risks associated with 'shadow AI' applications.
  • โ€ขCisco has introduced an 'Explorer Edition' of its AI Defense solution, enabling enterprises to perform self-service red teaming and assess the risk posture of AI models and applications before they are deployed into agentic workflows.
  • โ€ขAWS contributes a comprehensive security fabric for autonomous systems, utilizing services like Amazon Bedrock Guardrails, AWS Step Functions, Amazon Bedrock AgentCore, AWS IAM, and Amazon GuardDuty to build auditable and trustworthy AI agents.
๐Ÿ“Š Competitor Analysisโ–ธ Show
Feature/ProviderAWS & Cisco AI DefensePalo Alto NetworksMicrosoftSentinelOneCyberArk
Core FocusEnd-to-end AI agent security, lifecycle protection, hybrid cloud integration, MCP/A2A.AI-driven threat detection, identity security, cloud security, security orchestration.AI-driven threat detection, identity security, cloud security, security orchestration.AI-driven threat detection, identity security, cloud security, security orchestration.Identity-first approach to securing autonomous AI agents, privilege control, lifecycle management.
Key CapabilitiesAutomated vulnerability testing, runtime guardrails, network-layer visibility, compliance with NIST, OWASP, MITRE ATLAS.AI-driven SOC platform (Cortex XSIAM) with SIEM, SOAR, XDR, NDR.AI-driven threat detection, identity security, cloud security.AI-driven threat detection, real-time monitoring, automated response.AI agent discovery, context enrichment, privilege control, threat detection.
AI Threat MitigationPrompt injection, data poisoning, model manipulation, adversarial attacks, shadow AI.Thousands of analytics models and detections, alert noise reduction.Capabilities in AI-driven threat detection.Real-time monitoring, automated response, protection of agent-driven environments.Reduces risks from over-permissioned or unmanaged agents.
Deployment ModelIntegrated with AWS cloud services, Cisco Security Cloud.Unified SOC platform.Cloud-based, integrates with Microsoft ecosystem.Cloud-based.SaaS, cloud, developer environments.
Compliance/StandardsAligns with NIST, MITRE ATLAS, OWASP LLM Top 10.----
Unique OfferingsCisco AI Defense: Explorer Edition for self-service red teaming; AWS AgentCore Identity for secure agent access.Cortex XSIAM consolidates multiple security capabilities.Strong position in the agentic AI security market.Strong position in the agentic AI security market.Focus on AI agents as a new class of privileged identities.

๐Ÿ› ๏ธ Technical Deep Dive

<ul> <li>**Cisco AI Defense Architecture**: Provides a contiguous layer of AI security, privacy, and safety for real-time, organization-wide AI risk management. It combines proprietary machine learning models, real-time threat intelligence, and automated guardrails. The solution integrates into existing development workflows for automated vulnerability testing and implements runtime guardrails for production applications. It leverages network-layer visibility across the Cisco Security Cloud and aligns with AI security standards such as NIST, MITRE ATLAS, and OWASP LLM Top 10.</li> <li>**AWS AgentCore Identity**: A standalone service designed to secure how AI agents access external services across various compute platforms (Amazon ECS, Amazon EKS, AWS Lambda, on-premises). It utilizes OAuth access tokens and a token vault, ensuring that each token is bound to a specific user identity with explicit consent, thereby maintaining an auditable chain from user authentication to agent action. The Authorization Code Grant flow is used for agentic workloads acting on behalf of users, providing user consent, session binding, and scoped delegation.</li> <li>**AWS Security Fabric for Autonomous Systems**: This ecosystem provides primitives for secure autonomy. Key strategies include preprocessing and classifying all context inputs before inference, explicitly encoding reasoning-to-action sequences, limiting the scope of permissions per tool, per agent, and per invocation, correlating LLM and system-level anomalies, verifying every document to prevent silent poisoning, and tracing reasoning and tool activity end-to-end. Services like Amazon Bedrock Guardrails, AWS Step Functions, Amazon Bedrock AgentCore, AWS IAM, and Amazon GuardDuty are leveraged to achieve these controls.</li> <li>**Model Context Protocol (MCP) and Agent-to-Agent (A2A) Security**: MCP is a standardized JSON-RPC 2.0 communication interface that decouples AI models from data sources and tools, allowing any AI model to connect to any MCP-speaking data source. A2A is Google's protocol for inter-agent collaboration. Security concerns in these protocols include information asymmetry (AI models processing hidden content), prompt injection, API key/credential theft, token replay attacks (where a token for one service is reused for another), Distributed Denial of Service (DDoS) risks from unthrottled agent requests, and context poisoning in A2A systems where a misbehaving agent sends malicious instructions to a peer.</li> </ul>

๐Ÿ”ฎ Future ImplicationsAI analysis grounded in cited sources

The agentic AI security market will experience substantial growth in the coming years.
The market is projected to grow from USD 1.65 billion in 2026 to USD 13.52 billion by 2032, at a CAGR of 42.0%, driven by the increasing adoption and complexity of multi-agent AI systems across enterprises.
Enterprises will increasingly adopt a 'security-by-design' approach for AI agents, integrating security measures from the initial development stages.
Solutions like Cisco AI Defense and AWS's security fabric emphasize testing and hardening AI agents before deployment and throughout their operational lifecycle, shifting away from security as an afterthought.
The partnership will accelerate the secure adoption of AI in complex hybrid and multi-cloud environments.
Cisco and AWS aim to bridge networking and cloud security, providing unified protection and consistent security policies across diverse hybrid and multi-cloud setups, which is critical for enterprise AI deployments.

โณ Timeline

2024-08
Cisco's Webex AI team leverages AWS SageMaker and Bedrock for generative AI.
2025-09
Cisco and AWS highlight their partnership for secure AI adoption and digital transformation.
2025-12
AWS releases its Agentic AI frontier model, AWS Security Agent, for security reviews and pentesting.
2026-01
AWS publishes prescriptive guidance for securing agentic AI systems on AWS.
2026-03
Cisco introduces AI security solutions, including AI Defense: Explorer Edition and DefenseClaw framework.
2026-05
AWS announces Amazon Bedrock AgentCore Identity to secure AI agent access to external services.

๐Ÿ“Ž Sources (19)

Factual claims are grounded in the sources below. Forward-looking analysis is AI-generated interpretation.

  1. vertexaisearch.cloud.google.com โ€” Auziyqgpaxpen32cfqcwtdzf5 Evcwwwemuu7n5qwgra4afcghfvypg0xwsd8c4n Epn4p 2ljiejjadqgikuxm9emnbrflewaa4khtg W4 Q Eolb3d3ifbecan Qdhhf45ume Ia4e81pjzx3wco 87wruiw=
  2. vertexaisearch.cloud.google.com โ€” Auziyqhdn3ntjaawx8xqqwa8bwq3pfgsugommnw9xybaj5ratxddyrcqpqp65u1e 0hbht44zgfmcmtirlvqulkom5gogzssowtcxmxgfoqqc Fa3kenu2x04uvaij8dxcw1cbs5dm3wuyog6sjatwc01wk8 F3sixfk6nnhfwlzql B5z4pruaau6lcebw5hoc 0dqz5m4=
  3. vertexaisearch.cloud.google.com โ€” Auziyqehkxa7v7uppnlym9n9ow Wzltwuh388acsam8 2pjny8fts Fzbcxudzkx5mtmqbefxra5fxbqcejj2e 4iqoexzkxcbvzjumawli9ly597qyveg5tgbu P L3wuyaxbttekqwha39evte2db1m39sfdtf9830ew==
  4. vertexaisearch.cloud.google.com โ€” Auziyqgbb9ad6hkzgsb5sjs7cbzyknptx 5mncj Ijuihfh8wadgnpwd8m3tt7s9iudnsdvlb7gxhrlq1qqvmivhtng3x29yg729t5o30d8wwnz Sky6fhaoatgzds5a Ehchlkdcuyqppjoubqzymsyn9pzkvwr Wd Io5a8fasj8hf4cutn1nk9ul2punljocjbfyuxq Zodzvkqkx11wygvnzciws1afj
  5. vertexaisearch.cloud.google.com โ€” Auziyqgitcp Rnzypxfcbkjlymva0gsabopkg2d Bdi4jcsmmlmmqdwzj855yx Z7swtty3kzzsajkcmhrtfz0li2ul6xre9bwtdbiqialuikvd9fpndretwsi58a 7b9fguwy2jw F39ktscdj3eqgaleepke 3w9rn6ul2mp3pacavvg42y Tkrwuqtvy9evfieu43
  6. vertexaisearch.cloud.google.com โ€” Auziyqf9urhfppvq5w51j 2toqfv1b10a0jmuf3kagy0a6iwxinxs Vupphb6xan Dxp0vqlyu Vewdqd Xy5pun Xtjtji Fglo2phl7pkrw5qfoe Cdvusjiicpntz0tgdiqjhmq6uvb2md Tqndcpaawhumnp3dfxjwvakk7owduare0uikbyrbpf2crbm0jfl3rjbvewltl Jpltudc=
  7. vertexaisearch.cloud.google.com โ€” Auziyqf18mcwftt06 Ewnem7 I Hemtdxsq75fpnh4mbyjvh8o17 1p3cppyggfjburw Unha6opkjp9i2lm0wmmei7 Qfxqibamtwojjq4r0sk4fiodhitafmaxf4lkbydaiuloc3jqn23ah7bcv Iidizyrxa42t8pzniwtxecsyhojzkl
  8. vertexaisearch.cloud.google.com โ€” Auziyqglyjpdybsiyd Ucd5v4k Cly 4566qxhofvuvzgd3c1hpl23hmtxpljxwduyvy9o8nw5dwouyiq1tumcpa6es7vjsjpgsm6pxuz5p Qlylisniuclm8ns03amnao3tuhdlxvq Rpbwo9odfuju31sixjcawzjcybbdyvvckpmvgeiwz5t 0dndd5jdmxxmmo0d8pahza4otw5kcugiickn1a==
  9. vertexaisearch.cloud.google.com โ€” Auziyqgvnma2kppjwvslgate4jeenrnc7hcwx08top Banhqnztelspebutuvxabdxxrhle3km6n036em8qdwbpyonpqaekurxteach3chs8uij2 Aaro7xtijmh3alh2o0fdthbej23hjpaqxbk5acfffnv4ukidjuapxw3uszzcikaleod6q==
  10. vertexaisearch.cloud.google.com โ€” Auziyqglkt95w Vesid Kcb8ougcu1t Rllci02o Ajj2syal1tsrejf43oat9005dfuj3n8158zlesoi Kl83c0mh14dubnrfyp3dhvkmofdoh2biikya5fvk5ocucgut6dsjj1nrmijnfhkktmx71azzjw6qqlce4pvj2khyp5o Tj3lmyvfba8xry5n9srvr
  11. vertexaisearch.cloud.google.com โ€” Auziyqerrwwjphzurcvgetfxrcvnow2nm4yjrx3fdt0g6qxehk1mi28bnujvvdmq6dvymxqpgpnf2eo6qg5sycbchr5op9sn Hnhdgl6nn8odyutcxiiwzxpok5jjxzwjael4cmnmgxm8gpr5ughsmm0mg20vxtpisckddd Ityh7onua6jnivn84hp1 Pdzjgo=
  12. vertexaisearch.cloud.google.com โ€” Auziyqhm88k4klukk0lxzvvoun8b1gx7lzjofqplmt4axdmyreu6ggvvouhhaq8ibsnj86nxzwu Ll1gmz2cyelkjfu F67zrh39imcxw1bfy3llalksgyzkqtu6c Cvkhi3wutr8ewpw2g3zbyiqualwl1bb6xwdva49murcsghtbyy2skn06ly12atrtbq A==
  13. vertexaisearch.cloud.google.com โ€” Auziyqeesqrw875vmvmu9h25pmzw2kjaxta2cf0f Y5 Alsuvl4ye Cjjzjdwq0zw76uge0v5yglqrovpix9 Sdhukx7ueboofsakb7 Ocugz7nmzhzowspr5hgyriv4ixgpzv3dabiw 8epv8fznmmxtrq6fznabdjofmhsmpbryxtql0ndvt7gvtvbiskiims=
  14. vertexaisearch.cloud.google.com โ€” Auziyqffgfc2avor8oxzo02bgzfj3ibuxfg8j4vqicrwop00xajtnnw5m Yuogero Yrbjkyvjew8c6gx1hasychpagvapthizdbfcr2ykt1pc2vvte2fol6xjfsttjlvhq2qlpoumewhuoxtv9r8vbslmx8o7zzj Veqz1ikj1vjz0p 87lf1guhtfy D Jh8tny0ctgzth02d4mfyexp Djfrgkceicl5y B6xrfv2bb0h
  15. vertexaisearch.cloud.google.com โ€” Auziyqg37fw3ezyfqm Ypc7mts6dynplrnxwhvczpza71gry8gkcus Pxqxbj3 Fyfk Kqvyfeoeudk2yizhqxnrgxe Zzjuq7vevacbrfp1h80v4tfys0q2eodqsqczsfi7m V05y1kbxwhwvajt An2iulxtkd06jfc3d6fdj2mbsburkpjkrlmnzyoay9lv5zzlgprdbwk5it87kbskyv Fgrvidjpqzedflywv79bjk2ouss29t8
  16. vertexaisearch.cloud.google.com โ€” Auziyqg Ewtbwxkfdjtgsbprpy9eimbqzlleprqdyiwuj0h6g80xsyljgotkqkps7nbzwi63exkyy3maa86 K4vw2k6jfue Zjeq02lia03jznd9wo35oxkt7pzldemsbqkiroogur7mdkul Hko Lonrht Bgt0q98g 91aknxvdp8jaq==
  17. vertexaisearch.cloud.google.com โ€” Auziyqgvl4oeygjbmsqe54bwty9klylwqwnsbsd 7zix8goehccoipp5t9fhez43tni1iih 18381o3jzrxukb0jg6ucfvcz Bexcfx0cqpomlwexwfwszkwsokff2ke Qgslnktjmczrqdp5obbui5onfv380m6aziq2ls9ip0paedokx Csqgxw==
  18. vertexaisearch.cloud.google.com โ€” Auziyqf6c9bbd8iou2jcx9mfuwje38 9hkdtmblmvsc1ilvydzel1xvkm0nr5gjpallxfrie Vg9m84a Qt06 Oypind4vu Pprbslwnyjvtd5z9vgrdzqv27 Vc5oz6x Xe059bqtgexdfywhx45sqzfc Crgw4uxp519x0bmpwtww15cybuttpbq Jurmxi5xhupa5hmdcssgp6rqsq7j7kivw9z8=
  19. vertexaisearch.cloud.google.com โ€” Auziyqfse05kbsekfzaeyejz 4khv Hfncfnmzhm9hq0eyac8wn Qiov0bbqbaa6asbnlfrjfjf8p7rfwmrqles1gs Q2j4vui0udikxfapj7m5iy 2hkkxhstvnhmls Gotuqxjnufuffdffvo=
๐Ÿ“ฐ

Weekly AI Recap

Read this week's curated digest of top AI events โ†’

๐Ÿ‘‰Related Updates

AI-curated news aggregator. All content rights belong to original publishers.
Original source: AWS Machine Learning Blog โ†—