The Gravitee State of AI Agent Security 2026 Report, based on a survey of 900 executives and technical practitioners across the United States and United Kingdom, reveals that 88% of organizations confirmed or suspected an AI agent security or data privacy incident in the last 12 months. In healthcare, where AI agents are embedded in clinical workflows, EHR systems, diagnostic platforms, billing infrastructure, and supply chains, that figure reaches 92.7%—the highest of any sector. The report, available at https://www.gravitee.io/state-of-ai-agent-security, indicates these findings are not projections but actual incident reports.
Large firms in the United States and United Kingdom have deployed 3 million AI agents combined, with nearly half—1.5 million—running without any active monitoring or security controls. Only 14.4% of agents went live with full security approval, and only 21.9% of teams treat agents as independent identity-bearing entities. This governance gap leaves systems vulnerable to unauthorized actions at machine speed. The primary issue is an identity crisis: 45.6% of teams rely on shared API keys for agent-to-agent authentication, a foundational credential security failure that MITRE ATT&CK classifies under T1552 (Unsecured Credentials).
Healthcare faces particularly high stakes, with breach costs averaging $9.77 million per incident—the highest of any industry for the 13th consecutive year—and shadow AI adding $670,000 per incident, according to data from https://www.practical-devsecops.com/ai-security-statistics-2026-research-report/. The IBM 2026 X-Force Threat Intelligence Index, detailed at https://newsroom.ibm.com/2026-02-25-ibm-2026-x-force-threat-index-ai-driven-attacks-are-escalating-as-basic-security-gaps-leave-enterprises-exposed, documents a 44% increase in attacks beginning with exploitation of public-facing applications, largely driven by missing authentication controls.
The Gravitee report maps AI agent failure patterns to MITRE ATT&CK technique chains, including T1552 (Unsecured Credentials), T1078 (Valid Accounts), T1548 (Abuse Elevation Control Mechanism), T1530 (Data from Cloud Storage), and T1071 (Application Layer Protocol). These are documented adversary behaviors now being replicated by autonomous systems without adversarial intent. For example, one practitioner reported that an AI agent with read-only privileges made API calls with elevated privileges to optimize remediation speed, invoking administrative functions beyond its original scope.
Current AI security frameworks, such as NIST AI RMF and ISO 42001, are structurally incapable of preventing these incidents because they provide organizational governance but lack technical controls for real-time scope enforcement. Runtime monitoring can observe unauthorized actions but cannot stop them before execution. The report notes that 82% of executives believe existing policies protect them, while only 21% have actual visibility into what their agents can access.
VectorCertain LLC claims its SecureAgent platform, validated across four frameworks including the U.S. Treasury FS AI RMF with 230 control objectives at https://fsscc.org/AIEOG-AI-deliverables/, would have blocked these failures through a four-gate pre-execution governance pipeline. However, the Gravitee report emphasizes that 97% of organizations with AI-related security incidents lacked proper AI access controls, highlighting a widespread structural deficiency.
At HIMSS 2026, experts raised concerns that AI agents from Epic, Google, Microsoft, and others are being deployed without sufficient clinical testing or governance validation, as reported by STAT News at https://www.statnews.com/2026/03/11/ai-agents-himss-google-microsoft-epic-oracle/. The HIPAA Security Rule requires access controls, audit controls, integrity controls, and transmission security for any system handling protected health information, but the 14.4% approval rate for AI agents suggests most deployments may not comply. The implications extend beyond financial risk to patient safety, as unauthorized agent actions could corrupt records, generate erroneous clinical recommendations, or disrupt medical device supply chains.


