Anetac, a startup based in Silicon Valley focused on safeguarding companies against identity-related vulnerabilities in hybrid environments, has released its first Identity Security Posture Management (ISPM) Survey Report. This report is grounded in an extensive survey of 201 identity security professionals conducted by Censuswide, highlighting significant gaps in visibility, hygiene, and control regarding both machine and human accounts. The findings indicate concerning trends in machine identity vulnerabilities, including issues related to service accounts, APIs, and tokens, as well as human accounts that expose organizations to potential cyber threats. A major issue identified is the insufficient visibility and oversight of service accounts.
Unmonitored service accounts present a critical risk to organizations worldwide, as they are often over-privileged, mismanaged, and frequently overlooked. This negligence creates prime opportunities for cybercriminals to gain unauthorized access, escalate privileges, and navigate through networks undetected.
Identity security professionals are struggling to keep pace with the swiftly evolving threat landscape. The speed and complexity of emerging threats frequently outstrip organizational security efforts. Therefore, enhancing visibility is the first essential step in addressing the identity security challenge.
As companies mature, their identity security challenges often become more complex and entrenched. To effectively mitigate risks, businesses must shift from static, periodic reviews to dynamic, real-time monitoring solutions that align with the intricate, interconnected nature of modern hybrid environments.
Key findings from the Anetac ISPM Survey Report include:
- Visibility issues: 44% of IT security professionals rely on manual logging for service account visibility, while 10% report having no visibility measures in place. Additionally, 47% depend on static tools, which may overlook real-time security threats.
- Misuse of hybrid accounts: 75% of organizations admit to the risky practice of treating service accounts as human accounts or vice versa, blurring the distinctions between automated processes and individual user actions. This misuse occurs in both on-premises and cloud environments.
- Company assets at risk: A significant 76% of IT security professionals acknowledged that their service accounts have direct access to their organizationâs most critical and sensitive assets. However, 40% indicated that only 0-14% of their service accounts possess such high-level access.
- Lengthy password rotation cycles: Alarmingly, 53% of security professionals take 13 weeks or longer to rotate service account passwords, with 35% extending this period to 16 weeks or more. Even more concerning, 3% admitted to rotating these vital passwords only once every 1-5 years.
Challenges in visibility, hybrid account misuse, and poor cyber hygiene have long been prevalent in cybersecurity, but the emergence of AI has intensified these risks. Organizations can no longer depend solely on their teams without modern, effective tools.
Anetac’s interactions with clients have highlighted troubling security gaps stemming from machine identity account misuse. For instance, one administrator used a service account with elevated privileges for personal communications, while another utilized it to place food delivery orders for developer teams. Such misconfigurations create serious vulnerabilities, allowing attackers unauthorized access and heightening the risk of data breaches. Each machine identity account, particularly those with elevated privileges, increases the attack surface, making stringent management and access controls vital for maintaining a robust security posture. Organizations can take immediate actions to address these vulnerabilities by:
- Implementing real-time, streaming visibility to identify all machine and human identity accounts, mapping their access chains, and enhancing password hygiene.
- Establishing and enforcing consistent, industry-standard password rotation policies.
- Ensuring that solutions bolster the effectiveness of existing control frameworks.
The ISPM Survey Report emphasizes the urgent need for improved practices in managing machine identity accounts across organizations. As cyber threats continue to evolve rapidly, prioritizing visibility, regular password rotation, and stringent access controls for service accounts is crucial for protecting valuable assets.