Zero Trust

Zero-Trust AI Architecture: Securing Autonomous Agents, APIs, and Decision Systems

✎ Kieran Upadrasta 📅 2026-03-08 🎓 CISSP, CISM, CRISC, CCSP

Traditional zero-trust models were designed for human-initiated network traffic. AI systems introduce fundamentally new attack surfaces: autonomous agents making consequential decisions, API chains that execute without human intervention, and machine identities with asymmetric capabilities. This report extends zero-trust principles to cover AI-specific threats, defines microsegmentation for agentic systems, establishes continuous verification protocols for machine identities, and implements least-privilege frameworks that govern what autonomous systems can do.

  1. 01Zero-Trust Principles and AI Attack Surfaces
  2. 02AI-Specific Threat Models
  3. 03Machine Identity Architecture
  4. 04Microsegmentation for Autonomous Agents
  5. 05Continuous Verification Protocols
  6. 06Least-Privilege for Autonomous Systems
  7. 07API Chain Security
  8. 08Implementation and Integration
K

Kieran Upadrasta

CISO & Strategic Cyber Consultant · CISSP, CISM, CRISC, CCSP

27 years securing financial services · Big 4 pedigree (Deloitte, PwC, EY, KPMG) · Zero breaches managing £500B+ in assets

https://www.kieranupadrasta.com · LinkedIn