Non-Human Identities Surge, Exposing Massive Software Security Risks

Article Highlights
Off On

The rapid evolution of non-human identities (NHIs) within the realm of software security has led to the emergence of significant security blind spots. NHIs, including service accounts, microservices, and AI agents, now significantly outnumber human users, vastly expanding attack surfaces for potential threat actors.

Rising Secret Leaks

Escalation of Exposed Secrets

23.77 million new secrets were leaked on GitHub, marking a 25% increase from the previous year. This substantial rise is directly linked to the expanded deployment of NHIs. These machine-based credentials are indispensable to modern infrastructure, yet their management often falls short, leading to critical security vulnerabilities. In DevOps environments, machine identities surpass human identities by at least 45-to-1, and when mismanaged, they exacerbate the growing attack landscape, creating novel challenges for cybersecurity professionals.

Persistent Credential Exposure

A critical concern highlighted in the report is the persistence of exposed credentials. An analysis reveals that 70% of secrets detected in public repositories in 2022 remain active, pointing to severe systemic failures in credential rotation and management. This persistent exposure indicates a pressing need for improved practices in managing and rotating credentials to avert long-term vulnerabilities and exploitation risks. Organizations must prioritize the automation and regular rotation of credentials, ensuring they do not remain active for extended periods, thus reducing the attack surface significantly.

Private Repositories and AI Complications

Security Misconceptions in Private Repositories

Despite a common belief that private repositories provide enhanced security, data tells a different story. Private repositories are approximately eight times more likely to contain secrets compared to their public counterparts. This situation suggests that many organizations rely on a false sense of security through obscurity rather than robust secrets management protocols. The report elucidates the types of secrets commonly leaked in private versus public repositories, revealing that generic secrets make up 74.4% of all leaks in private repositories but only 58% in public repositories. This demonstrates that developers tend to cut corners in seemingly protected environments, which poses substantial risks.

AI’s Role in Secret Leaks

The proliferation of AI coding assistants such as GitHub Copilot has further complicated these security issues. Repositories employing Copilot show a 40% higher incidence rate of secret leaks than those without AI assistance. While AI-powered development tools can boost productivity, they may inadvertently push developers to prioritize speed over security. This rush can result in credentials being embedded in ways that traditional coding practices might avoid, leading to significant security vulnerabilities. It’s crucial for developers to maintain a balance between achieving productivity gains and ensuring robust security measures are upheld.

Broader Impact and Oversight Issues

Docker Images and Container Security

GitGuardian’s extensive analysis of 15 million public Docker images from Docker Hub uncovered over 100,000 valid secrets, including AWS keys, GCP keys, and GitHub tokens belonging to Fortune 500 companies. Notably, 97% of these valid secrets were identified in image layers, with a majority appearing in layers smaller than 15MB. The prominence of ENV instructions, which accounted for 65% of all leaks, underscores significant oversights in container security practices. Organizations need to adopt stricter measures to scan and manage secrets within container images, ensuring these powerful tools do not become significant security liabilities.

Exposures Beyond Code Repositories

Secret leaks extend beyond traditional code repositories; collaboration platforms like Slack, Jira, and Confluence have emerged as significant vectors for credential exposure. The secrets found on these platforms tend to be more critical, with 38% of incidents classified as highly critical or urgent, compared to 31% in source code management systems. The lack of security controls within collaboration tools and inadvertent leaks by users from various departments exacerbates these issues. Additionally, only 7% of the secrets found in collaboration tools also appeared in the code base, complicating the problem further and highlighting the need for specialized scanning tools.

Excessive Permissions and Inadequacies of Current Solutions

The Burden of Broad Permissions

One major factor contributing to the problem is the excessive permissions associated with leaked credentials. 99% of GitLab API keys had either full access (58%) or read-only access (41%). Similarly, 96% of GitHub tokens provided write access, with 95% offering full repository access. These broad permissions greatly increase the potential damage that leaked credentials can inflict, enabling attackers to move laterally within systems and escalate privileges with relative ease. Organizations must enforce stricter permission protocols, ensuring that credentials are issued with the minimum required access to mitigate potential threats.

Inadequate Secret Management

Despite the increased use of secret management solutions, the report emphasizes that these tools alone cannot address the systemic issue. Even repositories utilizing secrets managers experienced a 5.1% incidence rate of leaked secrets in 2024. Addressing this issue necessitates a comprehensive strategy that encompasses the entire secrets lifecycle. Organizations need to implement automated detection systems, swift remediation processes, and integrate security measures throughout the development workflow to build a robust defense against secrets sprawl.

Call for Comprehensive Security Measures

Holistic and Proactive Approaches

In an era dominated by automated deployments, AI-generated code, and rapid application development, reactive and fragmented approaches to secrets management are no longer sufficient. Organizations must embrace holistic and proactive measures to ensure stringent practices in managing machine identities and their credentials. This approach entails not only leveraging advanced management tools but also cultivating a security-centric culture that prioritizes proper secrets management across all tiers of software development and operations. Continuous education and training on secrets management for all stakeholders are imperative to fortify defenses.

Imperative to Fortify Defenses

The rapid advancement of non-human identities (NHIs) in software security has given rise to major security blind spots. NHIs, which include service accounts, microservices, and artificial intelligence agents, now greatly outnumber human users, significantly broadening the attack surfaces that potential threat actors can exploit.

As software environments become more complex, the sheer volume of NHIs introduces new challenges in managing and securing these secrets. NHIs necessitate unique security protocols, differing significantly from those designed for human users. This imbalance creates opportunities for cybercriminals to infiltrate systems through vulnerabilities associated with NHIs. Consequently, organizations must adopt advanced security measures to mitigate these risks, ensuring that the integrity of their systems is maintained in light of the expanding digital landscape.

Explore more

Jenacie AI Debuts Automated Trading With 80% Returns

We’re joined by Nikolai Braiden, a distinguished FinTech expert and an early advocate for blockchain technology. With a deep understanding of how technology is reshaping digital finance, he provides invaluable insight into the innovations driving the industry forward. Today, our conversation will explore the profound shift from manual labor to full automation in financial trading. We’ll delve into the mechanics

Chronic Care Management Retains Your Best Talent

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-yi Tsai offers a crucial perspective on one of today’s most pressing workplace challenges: the hidden costs of chronic illness. As companies grapple with retention and productivity, Tsai’s insights reveal how integrated health benefits are no longer a perk, but a strategic imperative. In our conversation, we explore

DianaHR Launches Autonomous AI for Employee Onboarding

With decades of experience helping organizations navigate change through technology, HRTech expert Ling-Yi Tsai is at the forefront of the AI revolution in human resources. Today, she joins us to discuss a groundbreaking development from DianaHR: a production-grade AI agent that automates the entire employee onboarding process. We’ll explore how this agent “thinks,” the synergy between AI and human specialists,

Is Your Agency Ready for AI and Global SEO?

Today we’re speaking with Aisha Amaira, a leading MarTech expert who specializes in the intricate dance between technology, marketing, and global strategy. With a deep background in CRM technology and customer data platforms, she has a unique vantage point on how innovation shapes customer insights. We’ll be exploring a significant recent acquisition in the SEO world, dissecting what it means

Trend Analysis: BNPL for Essential Spending

The persistent mismatch between rigid bill due dates and the often-variable cadence of personal income has long been a source of financial stress for households, creating a gap that innovative financial tools are now rushing to fill. Among the most prominent of these is Buy Now, Pay Later (BNPL), a payment model once synonymous with discretionary purchases like electronics and