Survey: 92% fail to rotate machine credentials
Overview
A recent survey by the SANS Institute revealed that 92% of organizations do not regularly rotate machine credentials, which are essential for securing non-human identities, such as those used by automated systems and AI. As these non-human identities expand rapidly, the lack of effective governance measures leaves companies vulnerable to potential breaches. The survey suggests that many enterprises have outdated practices that fail to keep pace with the growing complexity of their IT environments. This oversight could allow malicious actors to exploit these weaknesses and gain unauthorized access to critical infrastructure. The findings emphasize the urgent need for organizations to reassess their security protocols and implement regular credential management practices to mitigate risks.
Key Takeaways
- Affected Systems: Non-human identities, automated systems, AI systems
- Action Required: Implement regular rotation of machine credentials and update governance measures for managing non-human identities.
- Timeline: Newly disclosed
Original Article Summary
A new SANS Institute survey exposes a dangerous asymmetry between the explosive proliferation of non-human identities and the outdated governance mechanisms meant to contain them, leaving enterprises critically exposed as agentic AI systems gain autonomous access to core infrastructure, according to ITPro.
Impact
Non-human identities, automated systems, AI systems
Exploitation Status
No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.
Timeline
Newly disclosed
Remediation
Implement regular rotation of machine credentials and update governance measures for managing non-human identities.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to Exploit, Critical.