Dispatch

Rethinking Authorization for the Age of Agentic AI (opens in new tab)

Examines how authorization frameworks must evolve for autonomous AI agents, covering dynamic policy enforcement, delegation chains, and the shift from static IAM to context-aware authorization.

Securing AI Agents: The Defining Cybersecurity Challenge of 2026 (opens in new tab)

Venture capital perspective on why 48% of cybersecurity professionals identify agentic AI as the top attack vector, and how authorization and identity controls must adapt.

How Uber Reinvented Access Control for Microservices (opens in new tab)

Deep dive into Uber's attribute-based access control system Charter, which separates authorization logic from application code across thousands of microservices.

Accelerating the Adoption of Software and AI Agent Identity and Authorization (opens in new tab)

NIST concept paper exploring how identity standards like OAuth 2.0 can be applied to AI agents, covering authorization delegation and audit logging for non-human entities.

State of AI Agent Security 2026: When Adoption Outpaces Control (opens in new tab)

Survey of 900+ practitioners finding that 88% of organizations reported AI agent security incidents, yet only 22% treat agents as independent identity-bearing entities.

How Google Manages Trillions of Authorizations with Zanzibar (opens in new tab)

System design walkthrough of Google Zanzibar's architecture, explaining how it stores trillions of permission records and serves millions of requests per second.

AI Agents Are Becoming Authorization Bypass Paths (opens in new tab)

How AI agents operating with broad shared credentials create unintended privilege escalation paths, since authorization is evaluated against the agent's identity rather than the requesting user's.

Authorization API 1.0 Final Specification Approved (opens in new tab)

The OpenID Foundation approved AuthZEN Authorization API 1.0 as a Final Specification, standardizing PEP-PDP communication the way OpenID Connect standardized authentication.

Request for Information: Security Considerations for AI Agents (opens in new tab)

NIST formally seeks public input on securing AI agent systems, including authorization controls, identity management, and prompt injection defenses.

The Looming Authorization Crisis: Why Traditional IAM Fails Agentic AI (opens in new tab)

Identifies seven limitations of legacy IAM frameworks for AI agents and proposes two new architectures for agent-native authorization.

OWASP Top 10: Broken Access Control Still Tops App Security List (opens in new tab)

Covers the OWASP Top 10 2025 release where broken access control maintains the number one position, with 100% of tested applications exhibiting some form of access control failure.

Top 10 Identity Security Insights from Forrester's 2025 Security Summit (opens in new tab)

Forrester research shows IAM spending will nearly double to $27.5B by 2029, with dynamic authorization replacing static entitlements.

A01:2025 Broken Access Control (opens in new tab)

The official OWASP Top 10 2025 entry documenting how broken access control affects 100% of tested applications, with 40 mapped CWEs.

Security for AI Agents: Protecting Intelligent Systems (opens in new tab)

Comprehensive guide to AI agent security threats including prompt injection and token compromise, advocating for dynamic authorization policies.

97% of Organizations with AI Breaches Lacked Proper AI Access Controls (opens in new tab)

IBM's 2025 Cost of a Data Breach Report reveals organizations with shadow AI face $670K in additional breach costs, and 97% of AI-related breaches lacked proper access controls.

How to Build Scalable Access Control for Your Web App (opens in new tab)

Developer handbook comparing RBAC, ABAC, and ReBAC access control models with practical implementation guidance.

Implementing a Zero Trust Architecture (SP 1800-35) (opens in new tab)

NIST's practice guide demonstrating 19 zero trust implementations, emphasizing authentication and authorization as discrete functions before resource access.

How to Implement Relationship Based Access Control (ReBAC) (opens in new tab)

Developer tutorial explaining ReBAC fundamentals including graph-based permission models, ownership, and hierarchical relationships with practical examples.

Attribute-Based Access Control at Uber (opens in new tab)

Uber's Charter authorization system uses Google CEL for policy conditions, now adopted by 70 services for fine-grained access control across APIs, databases, and infrastructure.

NIST SP 800-207A: Zero Trust Access Control for Cloud-Native Applications (opens in new tab)

Guidance on zero trust access control for distributed microservices, shifting focus from network perimeters to identity-based authentication and authorization.

Adventures in Authentication and Authorization (opens in new tab)

Netflix staff security engineer presents lessons from implementing ubiquitous authentication and authorization in a microservice zero-trust ecosystem.

Using ABAC to Solve Role Explosion (opens in new tab)

How ABAC eliminates role explosion in microservice architectures by dynamically evaluating user attributes against policies.

Authorization at Netflix Scale (opens in new tab)

Netflix senior engineer describes how Netflix handles 3 million authorization requests per second, evolving from distributed rules to a centralized Product Access Service.

Himeji: A Scalable Centralized System for Authorization at Airbnb (opens in new tab)

Airbnb's Zanzibar-inspired authorization system stores tens of billions of relations and serves nearly a million authorizations per second with 12ms p99 latency.

Edge Authentication and Token-Agnostic Identity Propagation (opens in new tab)

Netflix's Access and Identity Management team describes moving authentication to the edge and creating cryptographically-verifiable identity propagation across microservices.

Zanzibar: Google's Consistent, Global Authorization System (opens in new tab)

The foundational paper describing Google's global authorization system handling trillions of access control lists across Calendar, Cloud, Drive, Maps, Photos, and YouTube.