AI agents are no longer a pilot; they’re a line item. Service accounts, automation scripts and machine identities now create vendors, approve payments and touch source code. If we can’t see and govern what they can do, that’s not just an IT risk; it is a liability that can’t be valued.
Finance leaders should treat non-human access like payroll: reconciled daily, owned and auditable, so that automation accelerates value without inflating exposure.
Why Identity Is A CFO Control
When a payment bot can create vendors and release funds, its entitlements are a cash control. When a data pipeline can redact or enrich records, its privileges influence revenue recognition and compliance. When a build system can sign code, its keys represent brand integrity.
Insider fraud, supply chain attacks and privacy penalties often travel through over-privileged or orphaned non-human identities, especially when “temporary” access becomes permanent.
The Inventory Problem You Can’t Audit
In my experience, most companies can’t answer three basic questions:
- How many non-human identities exist?
- Who owns them?
- What can they do?
Service accounts proliferate in cloud and OT; API tokens live in SaaS application settings no one remembers configuring. Spreadsheets and quarterly campaigns won’t solve a problem that changes daily. Finance needs a control surface that updates at the pace of the systems it governs.
Build A Living Map Of Access
The answer is a living, navigable model of people, systems and entitlements, reconciled to HR for humans and to accountable owners for machines. Think of it as an identity knowledge graph rebuilt every day: It discovers new agents, links them to workloads and traces what they can touch. For finance, this enables continuous measurement of exposure and the ability to simulate changes.
Design SoD For Machines
We are comfortable with segregation of duties for humans. However, we rarely apply the same rigor to automation. Start with cross-domain conflicts like “create supplier” and “release payment,” “promote code” and “sign binaries,” “modify ledger rules” and “post journals.” Define compensating controls where strict separation isn’t feasible. Make exceptions visible, time-boxed and owned. With a daily graph, conflicts can’t hide.
Treat Life Cycle Like Headcount
Bots should have the same joiner-mover-leaver discipline that is applied to employees. Define an owner and sponsor, require a business justification and set an end date. Rotate keys on a schedule that matches criticality. When a service scales out, review identities dynamically with least privilege; when it scales back, retire them. The digital twin should verify changes and reopen tickets when a revoke fails, or a permission reappears.
Create An 'Access P&L'
CFOs need metrics that move decisions. These could be:
- Reconciliation Rate: Percentage of non-human identities tied to an owner and workload.
- High-Risk Privilege Exposure: Agents with payment, code-signing or data-deletion rights.
- Rotation Half-Life: Time to rotate keys or tokens.
- Toxic Combinations: Cross-system conflicts open beyond policy.
- Remediation Velocity: Median days from detection to verified fix.
- Audit Lead Time: Time to produce defensible evidence packs.
Each of these metrics has a cost, a risk curve and an accountable owner.
Procure With Identity Clauses
If vendors ship AI agents or automation features, insist on contractual controls: rotation APIs, tamper-evident logs and the ability to export identity data to your graph. Require compatibility with your identity and access governance and management system so that approvals and revocations occur when and where auditors expect them. In cloud agreements, treat machine identities like regulated data: who can see them, how they’re stored and how breaches are disclosed.
Align Insurance And Capital Costs
Cyber insurance underwriters increasingly ask for evidence of identity hygiene. Being able to export time-stamped lineage—from policy to identity to action to remediation—reduces uncertainty and premium pressure.
Just as importantly, a trustworthy identity model lowers the implicit cost of capital for automation projects. If you can test access changes safely, finance can green-light AI initiatives faster and avoid contingency buffers that dilute return on investment. Better data lowers premiums, accelerates approvals and protects enterprise value today.
Talk To The Board In Business Terms
Board members don’t want to hear about tokens and scopes; they want to understand materiality. Show how many agents can move money, alter code or change the ledger today, how quickly you can reduce that number and how evidence will be produced. Frame identity as operational resilience and regulatory defense.
Planning Activities CFOs Can Sponsor
- Baseline And Ownership: Begin with a read-only ingestion for HR, directories, cloud, ERP and key SaaS systems. Build the first unified access map and assign ownership for every identity.
- Risk Reduction Priorities: Identify and remediate top toxic combinations, rotate high-risk credentials and establish life cycle governance for joiners, movers and leavers.
- Non-Human Oversight: Design a process for reviewing and certifying non-human identities across finance, ensuring all revokes are traceable.
- Governance Framework: Define access KPIs and reporting cadence. Compile and publish reporting packs, and report progress to the audit committee or board.
Four Steps To Achieve 'Good'
Step one: Assign ownership for every non-human identity. Define purpose, rotation policy and reduce high-risk privileges to essentials.
Step two: Identify toxic combinations, time-box exceptions and make evidence exportable on demand.
Step three: Automate access reviews and simulate access changes before implementation.
Step four: Deliver faster outcomes, reduce incidents and achieve cleaner audits.
The CFO’s Leverage
Boards are signing off on the use of AI, regulators are watching and insurers are pricing uncertainty. The control that reconciles all three is identity. If agents can modify ledgers, vendors or code without clear ownership and least privilege, we’ve introduced material risk.
Finance leaders don’t need to be IAM experts to lead this shift. We should insist on daily visibility, life cycle discipline and provable controls for the agents that power our business. Treat machine identity like payroll: accurate, reconciled and governed.
The companies that learn to scale automation with trustworthy identity data will ship faster, withstand shocks and compound value. Those that don’t will grow risk as quickly as they grow their bots.