Non-Human Identities Surge, Exposing Massive Software Security Risks

Article Highlights
Off On

The rapid evolution of non-human identities (NHIs) within the realm of software security has led to the emergence of significant security blind spots. NHIs, including service accounts, microservices, and AI agents, now significantly outnumber human users, vastly expanding attack surfaces for potential threat actors.

Rising Secret Leaks

Escalation of Exposed Secrets

23.77 million new secrets were leaked on GitHub, marking a 25% increase from the previous year. This substantial rise is directly linked to the expanded deployment of NHIs. These machine-based credentials are indispensable to modern infrastructure, yet their management often falls short, leading to critical security vulnerabilities. In DevOps environments, machine identities surpass human identities by at least 45-to-1, and when mismanaged, they exacerbate the growing attack landscape, creating novel challenges for cybersecurity professionals.

Persistent Credential Exposure

A critical concern highlighted in the report is the persistence of exposed credentials. An analysis reveals that 70% of secrets detected in public repositories in 2022 remain active, pointing to severe systemic failures in credential rotation and management. This persistent exposure indicates a pressing need for improved practices in managing and rotating credentials to avert long-term vulnerabilities and exploitation risks. Organizations must prioritize the automation and regular rotation of credentials, ensuring they do not remain active for extended periods, thus reducing the attack surface significantly.

Private Repositories and AI Complications

Security Misconceptions in Private Repositories

Despite a common belief that private repositories provide enhanced security, data tells a different story. Private repositories are approximately eight times more likely to contain secrets compared to their public counterparts. This situation suggests that many organizations rely on a false sense of security through obscurity rather than robust secrets management protocols. The report elucidates the types of secrets commonly leaked in private versus public repositories, revealing that generic secrets make up 74.4% of all leaks in private repositories but only 58% in public repositories. This demonstrates that developers tend to cut corners in seemingly protected environments, which poses substantial risks.

AI’s Role in Secret Leaks

The proliferation of AI coding assistants such as GitHub Copilot has further complicated these security issues. Repositories employing Copilot show a 40% higher incidence rate of secret leaks than those without AI assistance. While AI-powered development tools can boost productivity, they may inadvertently push developers to prioritize speed over security. This rush can result in credentials being embedded in ways that traditional coding practices might avoid, leading to significant security vulnerabilities. It’s crucial for developers to maintain a balance between achieving productivity gains and ensuring robust security measures are upheld.

Broader Impact and Oversight Issues

Docker Images and Container Security

GitGuardian’s extensive analysis of 15 million public Docker images from Docker Hub uncovered over 100,000 valid secrets, including AWS keys, GCP keys, and GitHub tokens belonging to Fortune 500 companies. Notably, 97% of these valid secrets were identified in image layers, with a majority appearing in layers smaller than 15MB. The prominence of ENV instructions, which accounted for 65% of all leaks, underscores significant oversights in container security practices. Organizations need to adopt stricter measures to scan and manage secrets within container images, ensuring these powerful tools do not become significant security liabilities.

Exposures Beyond Code Repositories

Secret leaks extend beyond traditional code repositories; collaboration platforms like Slack, Jira, and Confluence have emerged as significant vectors for credential exposure. The secrets found on these platforms tend to be more critical, with 38% of incidents classified as highly critical or urgent, compared to 31% in source code management systems. The lack of security controls within collaboration tools and inadvertent leaks by users from various departments exacerbates these issues. Additionally, only 7% of the secrets found in collaboration tools also appeared in the code base, complicating the problem further and highlighting the need for specialized scanning tools.

Excessive Permissions and Inadequacies of Current Solutions

The Burden of Broad Permissions

One major factor contributing to the problem is the excessive permissions associated with leaked credentials. 99% of GitLab API keys had either full access (58%) or read-only access (41%). Similarly, 96% of GitHub tokens provided write access, with 95% offering full repository access. These broad permissions greatly increase the potential damage that leaked credentials can inflict, enabling attackers to move laterally within systems and escalate privileges with relative ease. Organizations must enforce stricter permission protocols, ensuring that credentials are issued with the minimum required access to mitigate potential threats.

Inadequate Secret Management

Despite the increased use of secret management solutions, the report emphasizes that these tools alone cannot address the systemic issue. Even repositories utilizing secrets managers experienced a 5.1% incidence rate of leaked secrets in 2024. Addressing this issue necessitates a comprehensive strategy that encompasses the entire secrets lifecycle. Organizations need to implement automated detection systems, swift remediation processes, and integrate security measures throughout the development workflow to build a robust defense against secrets sprawl.

Call for Comprehensive Security Measures

Holistic and Proactive Approaches

In an era dominated by automated deployments, AI-generated code, and rapid application development, reactive and fragmented approaches to secrets management are no longer sufficient. Organizations must embrace holistic and proactive measures to ensure stringent practices in managing machine identities and their credentials. This approach entails not only leveraging advanced management tools but also cultivating a security-centric culture that prioritizes proper secrets management across all tiers of software development and operations. Continuous education and training on secrets management for all stakeholders are imperative to fortify defenses.

Imperative to Fortify Defenses

The rapid advancement of non-human identities (NHIs) in software security has given rise to major security blind spots. NHIs, which include service accounts, microservices, and artificial intelligence agents, now greatly outnumber human users, significantly broadening the attack surfaces that potential threat actors can exploit.

As software environments become more complex, the sheer volume of NHIs introduces new challenges in managing and securing these secrets. NHIs necessitate unique security protocols, differing significantly from those designed for human users. This imbalance creates opportunities for cybercriminals to infiltrate systems through vulnerabilities associated with NHIs. Consequently, organizations must adopt advanced security measures to mitigate these risks, ensuring that the integrity of their systems is maintained in light of the expanding digital landscape.

Explore more

Mastering Make to Stock: Boosting Inventory with Business Central

In today’s competitive manufacturing sector, effective inventory management is crucial for ensuring seamless production and meeting customer demands. The Make to Stock (MTS) strategy stands out by allowing businesses to produce goods based on forecasts, thereby maintaining a steady supply ready for potential orders. Microsoft Dynamics 365 Business Central emerges as a vital tool, offering comprehensive ERP solutions that aid

Spring Cleaning: Are Your Payroll and Performance Aligned?

As the second quarter of the year begins, businesses face the pivotal task of evaluating workforce performance and ensuring financial resources are optimally allocated. Organizations often discover that the efficiency and productivity of their human capital directly impact overall business performance. With spring serving as a natural time of renewal, many companies choose this period to reassess employee contributions and

Are BNPL Loans a Boon or Bane for Grocery Shoppers?

Recent economic trends suggest that Buy Now, Pay Later (BNPL) loans are gaining traction among American consumers, primarily for grocery purchases. As inflation continues to climb and interest rates remain high, many turn to these loans to ease the financial burden of daily expenses. BNPL services provide the flexibility of installment payments without interest, yet they pose financial risks if

Hybrid Cloud Market Poised for 17.2% CAGR Growth by 2032

The hybrid cloud market stands at a pivotal juncture, driven by technological innovations and the critical need for digital transformation across diverse sectors. This thriving ecosystem encompasses a wide array of services ranging from cloud computing solutions and advanced cybersecurity to data analytics and artificial intelligence. By merging cutting-edge technologies like the Internet of Things (IoT) and 5G, the market

Amazon’s Cloud Growth Slows Amid Microsoft and Google Gains

In the rapidly evolving landscape of cloud computing, Amazon Web Services (AWS) encountered a significant shift in its growth trajectory as it trails behind in the highly competitive sector marked by Microsoft and Google’s notable performances. AWS reported a year-over-year revenue increase of 16.9% in the first quarter to $29.27 billion but fell short of market forecasts, which anticipated a