HomeCyber Balkans20% of Organizations Have Experienced a Non-Human Identity Security Incident

20% of Organizations Have Experienced a Non-Human Identity Security Incident

Published on

spot_img

In today’s fast-paced business world, teams are expected to deliver more efficiently and quickly than ever before. This demand has led to the widespread use of third-party apps, no-code platforms, GenAI, and other automation tools. However, at the core of this automation and integration lies a crucial element – non-human identities (NHIs).

NHIs, such as bots, API keys, service accounts, and OAuth tokens, play a vital role in driving innovation and efficiency within enterprises. Despite their importance, NHIs also represent a significant security blind spot, as highlighted by recent high-profile cyber attacks on major companies like AWS, Microsoft, Cloudflare, and Okta.

The increase in cyber attacks targeting NHIs underscores two key realities: hackers are actively exploiting this vulnerability, and many organizations are not adequately equipped to defend against NHI-related threats. The sheer volume of NHIs, which outnumber human identities by a ratio of 20 to 1, presents a major challenge for security professionals.

A recent survey conducted by the Cloud Security Alliance revealed that 1 in 5 organizations have already experienced a security incident related to NHIs. This statistic serves as a wake-up call for businesses to prioritize the security of their non-human identities.

The survey also highlighted a significant confidence gap among IT and security practitioners when it comes to securing NHIs. While 25% express “high confidence” in securing human identities, only 15% feel the same way about non-human identities. This lack of confidence is further compounded by the fact that 69% of organizations have moderate to high concerns about NHIs as a potential attack vector.

One of the most challenging aspects of NHI security identified in the survey is the management of service accounts, with 32% of respondents citing this as their top challenge. Other pain points include auditing and monitoring, access and privileges, discovering NHIs, and policy enforcement. Additionally, the lack of visibility into third-party vendors and OAuth apps presents a significant concern for organizations.

Furthermore, the survey revealed that many organizations struggle with managing API keys, with only 20% having a formal process for offboarding and revoking API keys. This lack of a structured approach leaves API keys vulnerable to exploitation.

Currently, organizations are using a variety of tools and solutions to secure NHIs, including IAM, PAM, and API security. However, these tools often address the issue in a fragmented manner, leading to more security incidents rather than preventing them.

Looking ahead, there is a growing recognition of the importance of investing in NHI security, with 25% of organizations already investing in this area and an additional 60% planning to do so within the next 12 months. By giving non-human identities the same level of attention as human identities, organizations can create a more secure business environment that is prepared for future threats.

In conclusion, it is essential for businesses to automate critical processes related to NHIs, such as permission management and API key handling, and adopt a targeted and unified approach to protecting non-human identities. By prioritizing NHI security, organizations can effectively mitigate the risks associated with these critical components of automation and integration.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...