HomeCyber BalkansDeciphering OWASP’s Top 10 Non-Human Identity Critical Risks

Deciphering OWASP’s Top 10 Non-Human Identity Critical Risks

Published on

spot_img

OWASP, a trusted resource for web application security best practices, has highlighted specific mitigations to address the risks associated with Non-Human Identities (NHIs). NHIs, such as service accounts, API keys, and machine credentials, play a critical role in modern applications and services for authentication and authorization. However, the misuse and improper management of NHIs can lead to significant security vulnerabilities and potential exploitation.

One of the key risks identified by OWASP is the reuse of NHIs across multiple applications and services. Organizations may opt to reuse NHIs with broad permissions due to the complexity of managing granular permissions for each NHI. This practice increases the likelihood of exploitation and can result in widespread impact if a compromised NHI is used across various systems. Examples provided by OWASP include the reuse of Kubernetes service accounts, sharing API keys between applications, and leveraging cloud credentials across different services and resources.

To mitigate the risks associated with NHI reuse, OWASP recommends assigning unique NHIs to each application or service, enforcing the principle of least privilege, and conducting regular audits of NHIs usage. By implementing these mitigating controls, organizations can reduce the likelihood of vulnerability chaining and limit the impact of compromised NHIs on their systems.

Another risk highlighted by OWASP is the human use of NHIs for manual tasks instead of their intended purpose for automated activities and workflows. This misuse can lead to challenges in auditing and monitoring NHI activities, potentially enabling malicious insiders or external attackers to exploit vulnerabilities. Examples cited by OWASP include administrators using service account credentials, developers executing commands with NHIs, and unauthorized access to NHIs for persistence.

To address the risks associated with human use of NHIs, OWASP recommends implementing dedicated identities for automated tasks, conducting regular audits and monitoring of NHI activities, utilizing context-aware access controls, and providing education to developers and administrators on the risks associated with human use of NHIs. These measures aim to enhance technical and cultural controls to mitigate the potential risks posed by the improper use of NHIs.

In conclusion, organizations must prioritize the proper management and mitigation of risks associated with NHIs to safeguard their systems and data from potential security threats. By following the recommendations provided by OWASP and implementing robust controls, organizations can strengthen their security posture and reduce the likelihood of exploitation through Non-Human Identities.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...