Non-Human Identities Surge, Exposing Massive Software Security Risks

Article Highlights
Off On

The rapid evolution of non-human identities (NHIs) within the realm of software security has led to the emergence of significant security blind spots. NHIs, including service accounts, microservices, and AI agents, now significantly outnumber human users, vastly expanding attack surfaces for potential threat actors.

Rising Secret Leaks

Escalation of Exposed Secrets

23.77 million new secrets were leaked on GitHub, marking a 25% increase from the previous year. This substantial rise is directly linked to the expanded deployment of NHIs. These machine-based credentials are indispensable to modern infrastructure, yet their management often falls short, leading to critical security vulnerabilities. In DevOps environments, machine identities surpass human identities by at least 45-to-1, and when mismanaged, they exacerbate the growing attack landscape, creating novel challenges for cybersecurity professionals.

Persistent Credential Exposure

A critical concern highlighted in the report is the persistence of exposed credentials. An analysis reveals that 70% of secrets detected in public repositories in 2022 remain active, pointing to severe systemic failures in credential rotation and management. This persistent exposure indicates a pressing need for improved practices in managing and rotating credentials to avert long-term vulnerabilities and exploitation risks. Organizations must prioritize the automation and regular rotation of credentials, ensuring they do not remain active for extended periods, thus reducing the attack surface significantly.

Private Repositories and AI Complications

Security Misconceptions in Private Repositories

Despite a common belief that private repositories provide enhanced security, data tells a different story. Private repositories are approximately eight times more likely to contain secrets compared to their public counterparts. This situation suggests that many organizations rely on a false sense of security through obscurity rather than robust secrets management protocols. The report elucidates the types of secrets commonly leaked in private versus public repositories, revealing that generic secrets make up 74.4% of all leaks in private repositories but only 58% in public repositories. This demonstrates that developers tend to cut corners in seemingly protected environments, which poses substantial risks.

AI’s Role in Secret Leaks

The proliferation of AI coding assistants such as GitHub Copilot has further complicated these security issues. Repositories employing Copilot show a 40% higher incidence rate of secret leaks than those without AI assistance. While AI-powered development tools can boost productivity, they may inadvertently push developers to prioritize speed over security. This rush can result in credentials being embedded in ways that traditional coding practices might avoid, leading to significant security vulnerabilities. It’s crucial for developers to maintain a balance between achieving productivity gains and ensuring robust security measures are upheld.

Broader Impact and Oversight Issues

Docker Images and Container Security

GitGuardian’s extensive analysis of 15 million public Docker images from Docker Hub uncovered over 100,000 valid secrets, including AWS keys, GCP keys, and GitHub tokens belonging to Fortune 500 companies. Notably, 97% of these valid secrets were identified in image layers, with a majority appearing in layers smaller than 15MB. The prominence of ENV instructions, which accounted for 65% of all leaks, underscores significant oversights in container security practices. Organizations need to adopt stricter measures to scan and manage secrets within container images, ensuring these powerful tools do not become significant security liabilities.

Exposures Beyond Code Repositories

Secret leaks extend beyond traditional code repositories; collaboration platforms like Slack, Jira, and Confluence have emerged as significant vectors for credential exposure. The secrets found on these platforms tend to be more critical, with 38% of incidents classified as highly critical or urgent, compared to 31% in source code management systems. The lack of security controls within collaboration tools and inadvertent leaks by users from various departments exacerbates these issues. Additionally, only 7% of the secrets found in collaboration tools also appeared in the code base, complicating the problem further and highlighting the need for specialized scanning tools.

Excessive Permissions and Inadequacies of Current Solutions

The Burden of Broad Permissions

One major factor contributing to the problem is the excessive permissions associated with leaked credentials. 99% of GitLab API keys had either full access (58%) or read-only access (41%). Similarly, 96% of GitHub tokens provided write access, with 95% offering full repository access. These broad permissions greatly increase the potential damage that leaked credentials can inflict, enabling attackers to move laterally within systems and escalate privileges with relative ease. Organizations must enforce stricter permission protocols, ensuring that credentials are issued with the minimum required access to mitigate potential threats.

Inadequate Secret Management

Despite the increased use of secret management solutions, the report emphasizes that these tools alone cannot address the systemic issue. Even repositories utilizing secrets managers experienced a 5.1% incidence rate of leaked secrets in 2024. Addressing this issue necessitates a comprehensive strategy that encompasses the entire secrets lifecycle. Organizations need to implement automated detection systems, swift remediation processes, and integrate security measures throughout the development workflow to build a robust defense against secrets sprawl.

Call for Comprehensive Security Measures

Holistic and Proactive Approaches

In an era dominated by automated deployments, AI-generated code, and rapid application development, reactive and fragmented approaches to secrets management are no longer sufficient. Organizations must embrace holistic and proactive measures to ensure stringent practices in managing machine identities and their credentials. This approach entails not only leveraging advanced management tools but also cultivating a security-centric culture that prioritizes proper secrets management across all tiers of software development and operations. Continuous education and training on secrets management for all stakeholders are imperative to fortify defenses.

Imperative to Fortify Defenses

The rapid advancement of non-human identities (NHIs) in software security has given rise to major security blind spots. NHIs, which include service accounts, microservices, and artificial intelligence agents, now greatly outnumber human users, significantly broadening the attack surfaces that potential threat actors can exploit.

As software environments become more complex, the sheer volume of NHIs introduces new challenges in managing and securing these secrets. NHIs necessitate unique security protocols, differing significantly from those designed for human users. This imbalance creates opportunities for cybercriminals to infiltrate systems through vulnerabilities associated with NHIs. Consequently, organizations must adopt advanced security measures to mitigate these risks, ensuring that the integrity of their systems is maintained in light of the expanding digital landscape.

Explore more

Revolutionizing SaaS with Customer Experience Automation

Imagine a SaaS company struggling to keep up with a flood of customer inquiries, losing valuable clients due to delayed responses, and grappling with the challenge of personalizing interactions at scale. This scenario is all too common in today’s fast-paced digital landscape, where customer expectations for speed and tailored service are higher than ever, pushing businesses to adopt innovative solutions.

Trend Analysis: AI Personalization in Healthcare

Imagine a world where every patient interaction feels as though the healthcare system knows them personally—down to their favorite sports team or specific health needs—transforming a routine call into a moment of genuine connection that resonates deeply. This is no longer a distant dream but a reality shaped by artificial intelligence (AI) personalization in healthcare. As patient expectations soar for

Trend Analysis: Digital Banking Global Expansion

Imagine a world where accessing financial services is as simple as a tap on a smartphone, regardless of where someone lives or their economic background—digital banking is making this vision a reality at an unprecedented pace, disrupting traditional financial systems by prioritizing accessibility, efficiency, and innovation. This transformative force is reshaping how millions manage their money. In today’s tech-driven landscape,

Trend Analysis: AI-Driven Data Intelligence Solutions

In an era where data floods every corner of business operations, the ability to transform raw, chaotic information into actionable intelligence stands as a defining competitive edge for enterprises across industries. Artificial Intelligence (AI) has emerged as a revolutionary force, not merely processing data but redefining how businesses strategize, innovate, and respond to market shifts in real time. This analysis

What’s New and Timeless in B2B Marketing Strategies?

Imagine a world where every business decision hinges on a single click, yet the underlying reasons for that click have remained unchanged for decades, reflecting the enduring nature of human behavior in commerce. In B2B marketing, the landscape appears to evolve at breakneck speed with digital tools and data-driven tactics, but are these shifts as revolutionary as they seem? This