Non-human identities push identity security into uncharted territory
Overview
Recent findings from Veza reveal that companies are struggling to manage a rapidly expanding identity attack surface. The number of permissions—essentially access rights for users—has grown at a pace that outstrips the ability of security teams to monitor them. Veza's data shows over 230 billion permissions are currently in use, creating significant blind spots in security oversight. This situation poses a risk as enterprises attempt to manage access requests and audits with inadequate visibility into who can do what within their systems. As non-human identities, such as bots and automated processes, become more prevalent, the challenges around identity security are intensifying, making it crucial for organizations to rethink their access management strategies.
Key Takeaways
- Action Required: Companies should enhance their identity management systems to improve visibility and control over permissions.
- Timeline: Newly disclosed
Original Article Summary
Enterprises are grappling with an identity attack surface that keeps expanding and slipping out of reach, according to Veza. Permissions growth outstrips oversight Permissions now grow faster than teams can track them. Enterprises often operate with hundreds of millions of active entitlements, each defining what an identity can do in a system. Veza measured more than 230 billion permissions across its dataset. This volume creates persistent blind spots. Security teams manage access requests, audits, and … More → The post Non-human identities push identity security into uncharted territory appeared first on Help Net Security.
Impact
Not specified
Exploitation Status
No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.
Timeline
Newly disclosed
Remediation
Companies should enhance their identity management systems to improve visibility and control over permissions.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.