Least Privilege Research Report 2026

96% of Enterprise Permissions Go Unused

AI agents will inherit them and turn dormant access into a security crisis

New research analyzing 2.4 million workers and 3.6 billion permissions, reveals a massive gap between granted access and real usage. Once AI agents inherit these permissions, the dormant exposure becomes active — at machine speed.

Permissions used
4% of granted permissions are exercised over 90 days. The other 96% go unused.
Data touched
9% of sensitive data is accessed. Workers have 10× the access they need.
Dangerous permissions
31% of workers can modify or delete sensitive data.

Agents Don't Behave Like Humans — They Run Without Limits

Humans are mostly understandable: they move slowly, they apply judgment, they don't want to get fired. So most permissions stay untouched. Agents don't work that way. Agents run continuously, testing what they can do. Then they do it.

Human worker
AI agent
Speed
Actions spread across hours, days, or weeks
Hundreds of actions per second
Judgment
Trusted — rightly or wrongly — to apply judgment; naturally limited by the hours in a day
Easily tricked, prone to hallucination; can confidently take wrong actions it believes are helpful
Accountability
Professional consequences for misuse
No personal consequences for mistakes
Operating hours
~8 hours/day, within normal workflows
Continuous, 24/7, no natural stopping point
Finding 01

Massive Permission Exposure Exists Across the Enterprise

New research analyzing 2.4 million workers and 3.6 billion application permissions, combined with enterprise SaaS configuration analysis, reveals a striking gap between granted access and actual usage. This creates a large dormant attack surface embedded directly into enterprise access models.

Organizations grant broad access to avoid blocking work. Permissions accumulate — granted to unblock a project, fix an issue, run a report — and are never revoked. Humans move slowly enough that the gap is tolerable. Agents remove that constraint.

96% of Permissions
Go Untouched
Permissions exercised
The other 96% go unused over the 90-day observation window — and most companies have agents inherit human permissions by default.
Only 4 in 100 workers take any action
100 workers. Each dot is one person.
Only 4 in 100 corporate workers take any action in most applications over a 90-day period.
Of those who exercise any permission, 83% go unused
Permissions exercised by active users
Even workers who take any action exercise only 17% of available permissions. The other 83% sit dormant — and agents inherit all of it.

"At 1Password, we’re seeing the same pattern Oso highlights as teams start putting AI agents into real production workflows. Access models built for humans don’t map cleanly to agents. When agents are handed broad, static permissions, the unused ones don’t just sit there, they quietly expand the attack surface. What teams need instead are identity systems that keep agent actions tightly scoped and explicitly tied back to human intent, so they can move fast without creating risk they didn’t mean to take."

Nancy Wang
CTO at 1Password
Finding 02

Most Employees Retain Broad Access to Sensitive Data — Including Data They Rarely Touch

Despite most permissions going unused, many employees still retain the ability to interact with sensitive information. In many environments these permissions remain permanently available, even when they are rarely required.

13% of workers can reach regulated data
Regulated data includes PII, financial records, and health information.
13 in 100 corporate workers have access to regulated data. When agents inherit those accounts, they inherit that access too.
Workers touch 9% of the data they can reach
9% of reachable records accessed over 90 days — the remaining 91% is untouched, but not inaccessible.
What an agent could do with the same access
Illustrative — not a direct finding, but a logical consequence of the data.
Human team — 90 days
9% records accessed
Agent with same permissions — seconds
100% if reachable, it's accessible — no judgment applied

"The biggest mistake companies are making with AI agents is assuming yesterday's identity model will hold. At Brex, we're deploying agents aggressively, but we're designing for failure modes upfront, not after an incident. Speed without control is risk, and control without speed is a blocker. Oso gives us the authorization foundation to move fast without expanding our attack surface."

Mark Hillick
CISO, Brex
Finding 03

Enterprise Access Models Systematically Overprovision Users

The research shows that excessive permissions are not accidental — they are often built directly into how enterprise systems are configured. Across enterprise SaaS environments, rigid, profile-heavy configurations grant broad privileges by default and are rarely revisited.

Configuration method

80%+

of access still managed through static profiles — despite platform guidance recommending modular permission sets
Profile-only users

1 in 4

users rely solely on profiles, creating rigidity, overexposure, and audit challenges
Admin access

~30%

admin assignments in some environments — up to six times the expected level, with high-privilege capabilities widely distributed

High-risk permissions such as Modify All Data and View All Data can override normal data-sharing controls, allowing users to access or alter large datasets across an entire environment. Administrative privileges vary dramatically: while many organizations maintain around 5% administrative users, some environments assign admin access to nearly 30% of their user base.

These are exactly the kinds of broad, static permissions that AI agents will inherit by default.

Finding 04

How Enterprise Systems Quietly Accumulate Excess Permissions

Permission sprawl rarely happens through a single decision. It accumulates gradually as systems evolve, roles expand, and access bundles are reused across teams.

A clear example appears in enterprise CRM environments. In Salesforce deployments examined as part of this research, access is still largely structured around static profiles rather than modular permission sets, even though the platform itself recommends a more granular model.

Access via static profiles
of Salesforce access managed through static profiles across environments analyzed
Profile-only users
of users relying entirely on profiles for their permissions

Profiles bundle large numbers of privileges together. Over time, as organizations add new workflows, integrations, and administrative needs, these profiles accumulate permissions that exceed what most users actually require. The impact becomes visible in the distribution of high-privilege capabilities: while many organizations maintain around 5% of users with administrative access, some environments showed admin privileges assigned to nearly 30% of users.

Permissions such as "View All Data" and "Modify All Data" amplify this risk further — overriding normal sharing controls and allowing unrestricted access across an entire environment. This pattern illustrates how enterprise systems can quietly accumulate broad, durable permissions that persist long after their original operational need has passed.

Finding 05

A Significant Minority of Workers Hold Dangerous Write and Export Permissions

Delete, modify, export — capabilities intended for selective use are held by a meaningful share of the workforce. Humans use them sparingly. Agents don't apply that restraint.

Prevalence of high-risk permissions

of corporate workers hold these capabilities

"At HashiCorp, we've spent many years helping organizations manage their sprawl of secrets. We consistently see that both humans and services are over-privileged and that bad hygiene turns into a major security threat, validated by this research. Now with agents, we are seeing the risks compound exponentially. There is a broader surface area of access, with more secrets, and more over-privilege than ever before. Organizations need to tackle authorization of agents, and avoid taking a bolt-on approach to security."

Armon Dadgar
Co-Founder & CTO, HashiCorp
Key Implication

AI Agents Will Inherit the Entire Permission Surface

For human users, unused permissions often remain dormant. AI agents change that dynamic completely.

When agents inherit existing user permissions, they gain access to the entire permission surface — not just the subset employees normally use. An AI agent operating with a typical employee account could immediately:

Access sensitive data the employee never viewed

Modify records the employee never opened

Export information the employee never downloaded

Because agents operate continuously and at machine speed, the dormant 96% of permissions can quickly become active exposure.

The Result: Dormant Access Becomes an Automated Security Risk

Enterprise permission models were designed for humans operating within natural limits. AI agents remove those limits. Instead of a small portion of permissions being exercised occasionally, agents can systematically execute any capability available to them — turning latent configuration problems into active security incidents.

Three Implications for Enterprise Security

Unused permissions represent unnecessary exposure. When the vast majority of permissions remain unused, organizations can reduce risk significantly by identifying and eliminating dormant access without disrupting normal operations.

The real risk lies in access to sensitive data and high-impact actions.

Permissions that allow data modification, bulk export, or unrestricted visibility across datasets determine the potential blast radius of both operational mistakes and malicious activity.

Autonomous systems require purpose-built access models. Agents should not inherit broad human permission bundles. Instead, their access should be narrowly scoped to the specific systems, data, and actions required for their tasks.

Access governance must evolve from static configuration to continuous visibility and control. As organizations introduce autonomous systems into their environments, understanding where sensitive data resides, who — or what — can reach it, and how that access is exercised becomes essential to operating safely at scale.

Definitions

Permission
Can this user perform this action on this resource?
Actor
A person, service, or AI agent taking action
Resource
The data or object being acted on
Action
What the actor does: view, edit, delete, export, share

Permission usage tracks whether you exercise a capability at all. If you can read documents and you read one, that's 100% usage — regardless of whether you could access 1 or 1,000 documents.

Resource access measures how many individual records get touched out of the total available. For example: if your CRM contains 500 opportunities and users access 10 of them in 90 days, then 2% of resources have been accessed.

What to Do Before Your Next Agent Deployment

Ten steps, ordered from immediate to strategic. Each is linked to the finding that motivates it.

1

Audit permission sprawl before deploying agents

If 96% of human access goes unused, that same access should not be handed to an agent.

2

Create dedicated agent identities

Don't let agents inherit user credentials. Purpose-built identities, minimum permissions.

3

Start agents in read-only mode

Observation first, write access later. Use logs to right-size permissions.

4

Log every agent action from day one

You cannot govern what you cannot see.

5

Configure agent-specific detection rules

SIEM alerts for out-of-scope queries, unfamiliar data access, privilege escalation attempts.

6

Triage permissions by blast radius

Lock down modify, delete, and export first. Read-only access is lower priority.

7

Use only vendor-maintained integrations

Battle-tested MCP servers over community tools with untested security boundaries.

8

Expand agent access incrementally

One integration at a time. Monitor, validate, then expand. Controlled rollout.

9

Run an agent red team exercise

Find permission gaps before an adversary does.

10

Make this a board-level conversation

Frame permissions infrastructure as what accelerates safe agent adoption.

Fifty Years of Principle, Almost No Measurement

To our knowledge, this is the first research examining how permissions are exercised in production. Most discussions focus on policy — how access should be structured. Far less is known about how access is actually used.

Our dataset is substantial but represents a slice of the ecosystem — companies who already take security seriously by investing in tools to manage access and data risk. Similar analyses from large infrastructure providers would deepen the industry's understanding considerably.

Secure Your Agents

To learn more about agentic security and how Oso and Cyera can help, book a meeting with our team.