Non-Human Identities Surge, Exposing Massive Software Security Risks

Article Highlights
Off On

The rapid evolution of non-human identities (NHIs) within the realm of software security has led to the emergence of significant security blind spots. NHIs, including service accounts, microservices, and AI agents, now significantly outnumber human users, vastly expanding attack surfaces for potential threat actors.

Rising Secret Leaks

Escalation of Exposed Secrets

23.77 million new secrets were leaked on GitHub, marking a 25% increase from the previous year. This substantial rise is directly linked to the expanded deployment of NHIs. These machine-based credentials are indispensable to modern infrastructure, yet their management often falls short, leading to critical security vulnerabilities. In DevOps environments, machine identities surpass human identities by at least 45-to-1, and when mismanaged, they exacerbate the growing attack landscape, creating novel challenges for cybersecurity professionals.

Persistent Credential Exposure

A critical concern highlighted in the report is the persistence of exposed credentials. An analysis reveals that 70% of secrets detected in public repositories in 2022 remain active, pointing to severe systemic failures in credential rotation and management. This persistent exposure indicates a pressing need for improved practices in managing and rotating credentials to avert long-term vulnerabilities and exploitation risks. Organizations must prioritize the automation and regular rotation of credentials, ensuring they do not remain active for extended periods, thus reducing the attack surface significantly.

Private Repositories and AI Complications

Security Misconceptions in Private Repositories

Despite a common belief that private repositories provide enhanced security, data tells a different story. Private repositories are approximately eight times more likely to contain secrets compared to their public counterparts. This situation suggests that many organizations rely on a false sense of security through obscurity rather than robust secrets management protocols. The report elucidates the types of secrets commonly leaked in private versus public repositories, revealing that generic secrets make up 74.4% of all leaks in private repositories but only 58% in public repositories. This demonstrates that developers tend to cut corners in seemingly protected environments, which poses substantial risks.

AI’s Role in Secret Leaks

The proliferation of AI coding assistants such as GitHub Copilot has further complicated these security issues. Repositories employing Copilot show a 40% higher incidence rate of secret leaks than those without AI assistance. While AI-powered development tools can boost productivity, they may inadvertently push developers to prioritize speed over security. This rush can result in credentials being embedded in ways that traditional coding practices might avoid, leading to significant security vulnerabilities. It’s crucial for developers to maintain a balance between achieving productivity gains and ensuring robust security measures are upheld.

Broader Impact and Oversight Issues

Docker Images and Container Security

GitGuardian’s extensive analysis of 15 million public Docker images from Docker Hub uncovered over 100,000 valid secrets, including AWS keys, GCP keys, and GitHub tokens belonging to Fortune 500 companies. Notably, 97% of these valid secrets were identified in image layers, with a majority appearing in layers smaller than 15MB. The prominence of ENV instructions, which accounted for 65% of all leaks, underscores significant oversights in container security practices. Organizations need to adopt stricter measures to scan and manage secrets within container images, ensuring these powerful tools do not become significant security liabilities.

Exposures Beyond Code Repositories

Secret leaks extend beyond traditional code repositories; collaboration platforms like Slack, Jira, and Confluence have emerged as significant vectors for credential exposure. The secrets found on these platforms tend to be more critical, with 38% of incidents classified as highly critical or urgent, compared to 31% in source code management systems. The lack of security controls within collaboration tools and inadvertent leaks by users from various departments exacerbates these issues. Additionally, only 7% of the secrets found in collaboration tools also appeared in the code base, complicating the problem further and highlighting the need for specialized scanning tools.

Excessive Permissions and Inadequacies of Current Solutions

The Burden of Broad Permissions

One major factor contributing to the problem is the excessive permissions associated with leaked credentials. 99% of GitLab API keys had either full access (58%) or read-only access (41%). Similarly, 96% of GitHub tokens provided write access, with 95% offering full repository access. These broad permissions greatly increase the potential damage that leaked credentials can inflict, enabling attackers to move laterally within systems and escalate privileges with relative ease. Organizations must enforce stricter permission protocols, ensuring that credentials are issued with the minimum required access to mitigate potential threats.

Inadequate Secret Management

Despite the increased use of secret management solutions, the report emphasizes that these tools alone cannot address the systemic issue. Even repositories utilizing secrets managers experienced a 5.1% incidence rate of leaked secrets in 2024. Addressing this issue necessitates a comprehensive strategy that encompasses the entire secrets lifecycle. Organizations need to implement automated detection systems, swift remediation processes, and integrate security measures throughout the development workflow to build a robust defense against secrets sprawl.

Call for Comprehensive Security Measures

Holistic and Proactive Approaches

In an era dominated by automated deployments, AI-generated code, and rapid application development, reactive and fragmented approaches to secrets management are no longer sufficient. Organizations must embrace holistic and proactive measures to ensure stringent practices in managing machine identities and their credentials. This approach entails not only leveraging advanced management tools but also cultivating a security-centric culture that prioritizes proper secrets management across all tiers of software development and operations. Continuous education and training on secrets management for all stakeholders are imperative to fortify defenses.

Imperative to Fortify Defenses

The rapid advancement of non-human identities (NHIs) in software security has given rise to major security blind spots. NHIs, which include service accounts, microservices, and artificial intelligence agents, now greatly outnumber human users, significantly broadening the attack surfaces that potential threat actors can exploit.

As software environments become more complex, the sheer volume of NHIs introduces new challenges in managing and securing these secrets. NHIs necessitate unique security protocols, differing significantly from those designed for human users. This imbalance creates opportunities for cybercriminals to infiltrate systems through vulnerabilities associated with NHIs. Consequently, organizations must adopt advanced security measures to mitigate these risks, ensuring that the integrity of their systems is maintained in light of the expanding digital landscape.

Explore more