Back to Blog

Securing Agentic AI: Insights from Google & AWS

Jeremy WeaverJune 13, 2025
Premium

A joint Google–AWS report explains how the Agent-to-Agent (A2A) protocol and the MAESTRO threat-modeling framework can harden multi-agent AI systems against spoofing, replay attacks, and other emerging risks.


Why Agentic AI Needs a New Security Playbook

As AI shifts from single-model chatbots to networks of autonomous agents, secure communication becomes mission-critical. Google and AWS’s new paper, “*[Building a Secure Agent AI Application Leveraging Google’s A2A Protocol](https://arxiv.org/pdf/2504.16902)*,” introduces the Agent-to-Agent (A2A) protocol—an identity-aware framework for authenticated, structured exchanges—and MAESTRO, a threat-modeling approach designed specifically for multi-agent environments.

A2A Protocol Essentials

A2A relies on several key building blocks:
  • AgentCard – A public JSON file describing an agent’s capabilities and endpoints.
  • Task – The unit of work with a clear lifecycle, status updates, and artifacts.
  • Message, Part, Artifact – Atomic elements of the conversation and its outputs.
  • A2A Server and Client – Services that route requests (via tasks.send or tasks.sendSubscribe) and push notifications.
Together, they allow agents to discover one another, prove identity, delegate jobs, and exchange results—all with minimal human oversight.

MAESTRO: Seven Layers of Threat Modeling

Traditional STRIDE-style models fall short for autonomous agents. MAESTRO (Multi-Agent Environment, Security, Threat, Risk, and Outcome) addresses that gap. It surfaces threats such as: 1. AgentCard Spoofing – Impersonating an agent’s capability file. 2. Task Replay – Re-submitting old tasks to trigger unintended actions. 3. Server Impersonation – Man-in-the-middle scenarios at the endpoint level. 4. Cross-Agent Task Escalation – Abusing privileges between agents. 5. Artifact Tampering – Injecting malicious data into outputs. 6. Authentication & Identity Weaknesses – JWT leakage or lax token practices. 7. Poisoned AgentCards – Embedding harmful instructions in metadata.

Mitigation Strategies in Plain Language

To counter these risks, the report recommends a layered defense:
  • Sign AgentCards digitally and validate schema fields before trust.
  • Use nonces, timestamps, and message authentication codes to block replays.
  • Enforce mutual TLS plus DNSSEC to authenticate agent endpoints.
  • Apply strict role-based access control (RBAC) and least-privilege tokens.
  • Sign or encrypt artifacts; set firm limits on file types and sizes.
  • Maintain detailed audit logs and rotate tokens frequently.
These measures, paired with continuous monitoring and recall authority, help developers pause or roll back rogue agents swiftly.

A2A Meets MCP: Horizontal and Vertical Security

While A2A focuses on secure agent-to-agent collaboration, Google’s Model Context Protocol (MCP) links agents vertically to external data tools and APIs. Used together, they enable sophisticated hierarchical workflows—yet each integration point must inherit MAESTRO-style safeguards to stay resilient.

Implications for Builders, Educators, and Mentors

For engineers, this paper doubles as a blueprint for deploying multi-agent systems without compromising security. For educators—and platforms such as [ibl.ai’s AI Mentor](https://ibl.ai/product/mentor-ai-higher-ed)—it highlights the rising importance of teaching secure API design, threat modeling, and continuous risk assessment to the next generation of AI developers.

Conclusion

The Google & AWS report is clear: agent autonomy demands equally autonomous-grade security. By embracing the A2A protocol’s signed, identity-aware messaging and MAESTRO’s layered threat analysis, organizations can capture the productivity gains of multi-agent AI while keeping catastrophic misuse at bay. As these systems move from proof-of-concept to production, proactive governance will be the cornerstone of sustainable innovation.