HomeCII/OTThe Invisible Army of Non-Human Identities

The Invisible Army of Non-Human Identities

Published on

spot_img

In today’s cybersecurity landscape, the presence of non-human identities (NHIs) has become a major concern for organizations. These invisible entities, including service accounts, system accounts, API keys, tokens, and other forms of machine-based authentication, have grown exponentially and are now a significant source of vulnerability for chief information security officers (CISOs).

For every 1,000 human users in an organization, there could be up to 10,000 NHIs, according to some estimates, creating a complex web of interactions in the digital ecosystem. While these NHIs play a crucial role in keeping digital machinery running smoothly, they also pose a significant risk as potential entry points for attackers. Their often-elevated privileges and lack of human oversight make them a lucrative target for malicious actors, highlighting the need for organizations to develop strategies to manage and secure these entities effectively.

The visibility challenges presented by NHIs further compound the problem. Unlike human users, NHIs operate in the background without proper governance, making them a significant blind spot for many security teams. Studies have shown that a vast majority of permissions granted to NHIs are not even utilized, leading to a phenomenon known as privilege sprawl, which increases the organization’s risk landscape unnecessarily.

Moreover, NHIs often facilitate connections to external services and partners, making them a potential vector for lateral movement in the event of a breach. Recent high-profile incidents involving nation-state actors and major software companies have underscored the critical role NHIs play in modern attacks. From abusing OAuth applications to compromising machine identities, attackers have leveraged NHIs to move laterally across cloud environments and gain unauthorized access to sensitive information.

To mitigate the risks associated with NHIs, organizations must take practical steps to enhance their security posture. This includes implementing tools and processes for continuous discovery and inventory of NHIs across all environments, as well as understanding the permissions associated with each entity and their potential risks.

Despite the challenges posed by the explosion of NHIs, there is also an opportunity for the cybersecurity community to address this issue proactively. By elevating NHI security to a top-tier priority and adopting a security-first culture, organizations can effectively manage and secure these entities. The future of cybersecurity will be defined by how well security professionals navigate this new frontier of identity security and rise to the challenge posed by the proliferation of non-human identities.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...