AI agents are the third wave of identity sprawl, and legacy IGA, PAM, and SIEM tools can't keep up. This Lumos guide shows how to close the loop - See, Understand, Act - across every human, non-human, and AI-agent identity in your environment.
Why IGA, PAM, and SIEM can't answer the question that matters: should this identity have this access right now?
The three fundamentals for governing AI agent access: ownership, intent, and composite review
How Identity Security Agents detect risk in minutes and turn fixes into durable governance policy
Identity is now the primary vector for breaches. Attackers don't need to break in when they can just log in, usually with credentials and entitlements that should never have existed in the first place. As AI agents spread throughout the enterprise, the number of identities acting on your behalf is growing faster than any team can manually track.
Every wave of automation has increased the identity attack surface. Workforce SaaS made access for non-employees common. Cloud infrastructure removed the perimeter. AI agents are adding a third wave: identities acting on behalf of people, often with privileged access and often without a clear owner. Each wave arrived faster than the previous one.
Each wave arrived faster than the previous one, and none of the tools designed for earlier waves had time to catch up. Most organizations still manage access like they did ten years ago: using static snapshots, performing manual reviews, and relying on tools that can answer "who has access?" but not the more critical question: "should they have it, and is it being abused right now?"
Security teams are inheriting access graphs they didn't build and can't monitor at scale, and only find out about risky access after something goes wrong.
Most organizations are managing identity security with tools designed to tackle different problems. Each category does its part, but none are made to govern the entire identity attack surface, both human and non-human, in real time.
Each tool has features that seem related: the IGA platform reports on entitlements, the SIEM correlates events, the PAM tool monitors privileged sessions, and the ITDR vendor oversees authentication. However, none can determine whether a specific human, service, or agent should have a certain entitlement at any given time. Therefore, they can't answer that question without human intervention to piece together the story.
The gap is not about any single tool. It lies in the lack of a continuously updated, security-grade view of the entire identity environment and the model needed to act on it. Closing the gap requires linking entitlement data, usage behavior, and risk signals in one system. This way, detecting overprivilege, evaluating it in context, and fixing it can all happen in the same workflow, using the same data, in a timely manner.
In its 2025 Hype Cycle for Digital Identity, Gartner introduced a category that addresses what the current toolkit lacks: Identity Visibility and Intelligence Platforms (IVIP). While IGA, PAM, and SIEM each cover parts of the identity environment, an IVIP provides rapid integration and unified visibility across an organization's complete IAM infrastructure—human, non-human, and AI-agent identities—all in one place.
This category offers a useful label for what every identity team has been piecing together. It also acknowledges, as stated by an analyst, that the piecemeal approach to identity security is no longer sufficient. Visibility and intelligence are fundamental components. Almost every modern identity program needs these traits, and the number of tools offering these features is growing.
But even in a category as recently created as IVIP, the speed of AI adoption has already begun to outpace new platforms built on IVIP principles. This is because many of them aren't built for the speed at which AI agents proliferate, and even those that are still treat AI NHIs as a separate category to manage.
In the modern AI agent era, stopping at visibility and intelligence falls into much the same trap that a SIEM falls into. You end up with a high-resolution picture of your risk and the same backlog you started with; better informed, no more secure. The solution is a third step: Action. The closed loop completes the picture in three steps, while most platforms cover only the first two.
That last step is where many identity tools fall short, as they don't manage the lifecycle, access reviews, or provisioning policies needed for sustainable solutions. It's the difference between revoking the same over-privileged admin every quarter and creating a policy that stops the grant altogether. Identifying a risk once and fixing it permanently; that is what closing the loop really means.
Modern identity security isn't just another dashboard added to outdated data. It's a continuously updated map of every identity, entitlement, and behavior, combined with AI agents that actively search for risks and remediation processes that occur on the same platform.
The shift is from viewing access as a configuration to seeing access as a continuously evaluated aspect of the identity. Configurations are reviewed quarterly, while characteristics are monitored every minute. This change significantly speeds up the detection of risky access, boosts confidence in remediation, and lowers the human effort needed for each decision.
Security gains a constantly updated view of the full identity attack surface. IAM benefits from automation that helps manage the noise. Compliance receives documentation as a byproduct of ongoing work. The organization gains the ability to detect and respond to identity risks in hours rather than quarters.
It also changes what good looks like for an identity program. Rather than measuring success by completion rates of reviews, teams can measure it by the level to which access aligns with policy and the time taken to address a risky entitlement. Those metrics are easy for a board to understand and hard for an attacker to overcome.
Every wave of automation has expanded the identity attack surface, and the current wave is advancing faster than the controls. Non-human identities like service accounts, API keys, OAuth grants, and workload credentials already outnumber human identities in most enterprises by 10:1 or more. AI agents are introducing a third wave: identities that act on behalf of people, often with privileged access and frequently without an identified owner.
Until recently, identity governance primarily dealt with two categories: humans and machines. Humans possess judgment; machines have computational power. AI agents are different: they combine reasoning and judgment with the scale of machines. A human with read-write access to a CRM might update a few records daily. An agent with the same access can export an entire database in seconds.
This changes what governance needs to achieve. Authentication reveals "who" the agent is. Authorization specifies what the agent can do. Neither answers the tougher questions: why does it have that access, who approved it, is it appropriate, and what happens when it's not? The answers to these governance questions are what is lacking in many agent deployments today.
Agent access also rarely takes one form. It may be granted as service accounts in cloud IAM, OAuth grants in SaaS, API keys in developer tools, certificates and workload identities in infrastructure, or increasingly, MCP connections that inherit a human user's full permissions. Each access method has different control surface, and none were designed with the presence of an AI agent in mind.
Across hundreds of customer environments, the same three key principles keep separating identity programs that govern agent access from those that just inventory it.
An agent connection without an owner is one that lacks governance. You cannot review access that nobody owns, enforce a lifecycle for it, or trace intent back to a decision that lacks a clear source.
When access is granted, the stated purpose is recorded along with it. Without this link, monitoring has no baseline to compare against.
Each access scope may seem reasonable on its own. However, the complete set granted to one agent—such as Slack history, GitHub repo access, and Sentry issues—needs governance.
This is where Identity Security Agents become important. They serve as the action layer of an IVIP, designed for specific tasks and capable of monitoring, detecting, and responding to risks without waiting for human intervention. If Albus is the analyst on your team, handling investigations, pattern recognition, and recommendations, then Identity Security Agents are the operators acting on that information. Albus provides insight into the data; the agents take action based on it.
Two of the initial agents Lumos has introduced address urgent gaps. The NHI Security Analysis agent scans Microsoft Entra ID to identify complex risk patterns—combinations like privileged access, multi-tenant exposure, long-lived credentials, and no assigned owner—that a single signal won't detect and that a manual analyst would take weeks to uncover. The Terminated User Account agent checks HRIS termination data against active access in connected systems, revealing post-departure access that was missed during offboarding. Both agents provide findings with complete evidence and suggested actions; they also learn from your team's feedback over time.
The model relies on progressive trust. Agents start with full oversight, where every recommendation surfaces for review before anything executes. As your team builds confidence, more is delegated. Initial calibration happens in a single session, not weeks: install, run a test scan, dismiss noise with feedback, re-run, repeat until the agent's output matches your team's expectations. Every dismissal becomes part of the baseline, and the agent gets sharper with each pass.
And because the agents live on the Lumos platform, the loop does not stop at remediation. A finding the agent surfaces and the team confirms can be translated into a durable governance rule—enforced through the same access reviews, lifecycle workflows, and provisioning policies that already govern human access. The same fix does not have to be made twice. That is what it means for IVIP, Security Agents, and IGA to live in one place.
Lumos brings IVIP, Identity Security Agents, and full IGA together in one platform — so security teams can see what they couldn't before, understand which combinations create real risk, and act before an attacker does. Request a personalized walkthrough and we'll show you Lumos in action.
Book a 1:1 demo with us and enable your IT and Security teams to achieve more.