Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Secret Weakness Overlooked by Leaders: Non-Human Identities
Global Security

Secret Weakness Overlooked by Leaders: Non-Human Identities

AdminBy AdminOctober 3, 2024No Comments7 Mins Read
Non-Human Identities
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Non-human identities

For years, the security of a company’s systems has been synonymous with the security of its “perimeter.” There was what was safe “inside” and a dangerous outside world. We’ve built robust firewalls and deployed sophisticated detection systems, confident that keeping the barbarians outside the walls will keep our data and systems safe.

The problem is that we no longer operate within the confines of physical premises and controlled networks. Data and applications now reside in distributed cloud environments and data centers that users and devices can access from anywhere on the planet. The walls crumbled and the perimeter dissolved, opening the door to a new battlefield: identity.

Identity is at the heart of what the industry has hailed as the new gold standard for enterprise security: “zero trust.” In this paradigm, explicit trust becomes mandatory for any interactions between systems, and no implicit trust should exist. Every access request, regardless of its origin, must be authenticated, authorized and continuously verified before access is granted.

The dual nature of identity

Identity is a broad concept with a dual reality. On the one hand, people need access to their email and calendar, and some (particularly software engineers) have privileged access to a server or database to do their jobs. The industry has been improving the management of these identities over the past 20 years as employees join, gain privileges to specific systems, and eventually leave the enterprise.

On the other hand, we have another type of identity: machine identity, also referred to as non-human identities (NHI)which make up the vast majority of all identities (estimated to outnumber human identities at least at a ratio of 45 to 1).

Unlike their human counterparts, NHIs, ranging from servers, programs, and processes, are not tied to individuals and thus pose an entirely different problem:

  • They are lack of traditional security measures because unlike users we can’t just apply MFA to the server or API key.
  • They are can be created at any time by anyone in the enterprise (imagine marketing connecting their CRM to their email client) with virtually no control. They are scattered across different tools, making managing them incredibly difficult.
  • They are overwhelmingly the over-privileged and very often “stale”: unlike human identities, NHIs are much more likely to persist long after their use. This creates a high-risk situation where overprovisioned credentials with broad permissions persist even after their intended use has ended.

All of this together represents a perfect storm for large enterprises struggling with vast cloud environments and complex software supply chains. Unsurprisingly, mismanaged identities – the symptom of which is proliferative secretions— are now the root cause of the majority of security incidents affecting businesses worldwide.

The high cost of inaction: real violations

The consequences of neglecting NHI security are not theoretical. There are many examples in the news of high-profile breaches where compromised NHIs served as an entry point for attackers, resulting in significant financial losses, reputational damage and undermining customer trust. Dropbox, Sisense, Microsoft and The New York Times are examples of companies that have admitted they were affected by a compromised NHI in 2024 alone.

Perhaps worst of all, these incidents have a ripple effect. In January 2024, Atlassian Cloudflare’s internal systems were breached because tokens and service accounts – in other words, NHI – were previously hacked on Okta, a leading identity platform. What’s particularly telling here is that Cloudflare quickly discovered the intrusion and responded by changing the suspect credentials. However, they later realized that some access tokens were not properly saved, giving attackers another chance to breach their infrastructure.

This is not an isolated story: 80% of organizations have experienced security breaches involving identity data, and in the 2024 edition of the DBIR, “Identity or Credential Compromise” was rated as the number one vector for cyber attacks.

Should you be concerned? Looking back at Cloudflare’s history, the effect is still unknown. However, the company disclosed that the remediation efforts included rotation everything 5000 production credentialsan extensive forensic triage and reboot of all company systems. Consider the time, resources, and financial burden such an incident would place on your organization. Can you afford such a risk?

Addressing misidentification issues, correcting both current exposure and future risks, is a long way to go. While there is no magic bullet, tackling one of the biggest and most complex security risks of our time is achievable. Organizations can reduce the risks associated with non-human entities by combining immediate actions with medium and long-term strategies.

Guiding Fortune 500 customers through this process for the past 7 years is what GitGuardian has done industry leader in security secrets.

Gaining control of NHIs starting with Secrets Security

Organizations must take a proactive and comprehensive approach to NHI security, starting with the security of secrets. Gaining control over NHIs starts with implementing effective secrets security capabilities:

1. Creating comprehensive and continuous visibility

You can’t defend what you don’t know. Secrets’ security starts with monitoring a wide range of assets at scale, from source code repositories to messaging systems and cloud storage. It’s critical to extend your monitoring beyond internal sources to detect any company-related secrets in high-risk areas like GitHub. Only then can organizations understand the extent of exposure to their sensitive information and take steps to remediate those vulnerabilities.

GitGuardian Secret Detection boasts the largest number of detectors and the widest range of monitored assets on the market, including all public GitHub activity for the past 5 years.

2. Optimizing recovery

Keeping secrets is not a one-time task, but an ongoing process. It must be integrated into software development and other workflows to find and remediate (revoke) hard-coded secrets and prevent the root cause of breaches. Timely and efficient remediation capabilities, limiting alert fatigue and streamlining the remediation process at scale are critical. This allows organizations to address issues before they can be exploited by attackers, effective and measurable risk reduction.

The GitGuardian Platform makes fixing the number one priority. Unified incident management, tailored remediation recommendations, and detailed incident information enable organizations to combat the threat of large-scale leaks.

3. Integration with identification and secret systems

Analyzing the context of a secret leak is critical to determining its sensitivity and associated risk. Integration with Identity and Access Management (IAM), Privileged Access Management (PAM) systems, and Secret Managers provides a more comprehensive view of NHI’s footprint and activity.

GitGuardian’s partnership with CyberArk Conjur, a leader in secret management and identity security, is an industry first. This partnership brings end-to-end security of secrets to the market, opening up new use cases such as automated open access detection, secret management policy enforcement, and automated post-leak rotation.

Changing Mindsets: From Perimeter to Secret Security

The rapid proliferation of non-human identities has created a complex and often overlooked security challenge. Traditional perimeter-based security measures are no longer sufficient in today’s distributed, cloud-centric environments. The risks associated with NHI mismanagement are real and potentially devastating, as evidenced by high-profile breaches that have resulted in significant financial and reputational damage.

However, there is hope. By shifting our focus to the security of secrets and adopting an integrated approach that includes robust detection, automated remediation, and integration with identity systems, organizations can significantly reduce the attack surface and strengthen their overall security posture.

It may sound complicated, but it’s a necessary evolution in our approach to cybersecurity. The time to act is now – the question is are you ready to accept security control of your secrets? Get started with GitGuardian today.

Did you find this article interesting? This article is from one of our respected partners. Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Turning Cybersecurity Practice into Mrr Machine

June 16, 2025

Malicious Pypi Masquerade Package as chimera module for theft Aws, CI/CD and MacOS

June 16, 2025

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.