{"id":19641,"date":"2021-10-18T19:38:35","date_gmt":"2021-10-18T19:38:35","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=19641"},"modified":"2021-10-18T19:38:35","modified_gmt":"2021-10-18T19:38:35","slug":"machine-identity-security","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/","title":{"rendered":"How Machine Identities Can Imperil Enterprise Security"},"content":{"rendered":"<p>Managing machine identities has never been more critical to an enterprise&#8217;s cybersecurity.<\/p>\n<p>Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Without thorough visibility and proper management of machine-to-machine communications, all those machines can become a huge security issue.<\/p>\n<p>Gartner\u2019s list of the <a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/gartner-top-security-and-risk-trends-for-2021\/\" target=\"_blank\" rel=\"noopener\">top security risks and trends for 2021<\/a> included machine identity management for the first time. This should come as no surprise. Coffing notes that the recently discovered <a href=\"https:\/\/www.techrepublic.com\/article\/83-million-devices-using-the-kalay-protocol-are-at-risk-for-remote-takeover-are-yours\/\" target=\"_blank\" rel=\"noopener\">ThroughTek Kalay<\/a> vulnerability compromised 83 million <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/iot-device-risk-to-enterprises\/\">IoT devices<\/a>, which better machine identity management could have prevented.<\/p>\n<p>\u201cThis security flaw would have been identified earlier if the organization had full visibility and control over every machine identity connected to their SDK,\u201d Coffing said.<\/p>\n<p>In a conversation with <em>eSecurity Planet<\/em>, Coffing explained why this area is such a concern and what enterprises can do in response.<\/p>\n<h2>Poor Machine Identity Management Introduces Risks<\/h2>\n<p>If the past few years of cybercrime trends indicate anything, it\u2019s that companies have a shocking number of vulnerabilities &#8211; and <a href=\"https:\/\/www.esecurityplanet.com\/trends\/becoming-a-cybercriminal-keeps-getting-easier\/\">cybercriminals are getting better at exploiting them<\/a>. Machine identities are one of the most prominent risks.<\/p>\n<p>The rise of automation and the IoT have resulted in enterprises unintentionally expanding their attack surface. \u201cWhile machines provide numerous benefits to organizations, such as the distributed ability to share and collect data, they also introduce new points of attack and added security challenges,\u201d said Coffing.<\/p>\n<p>As the ThroughTrek Kalay incident demonstrates, businesses lack visibility over their vast fleet of devices. Without complete visibility, it\u2019s not always easy to determine what data is going to which device. That uncertainty lets software vulnerabilities and the cybercriminals that exploit them go undetected as they compromise organizations\u2019 information.<\/p>\n<p>Also read: <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">Top Vulnerability Management Tools<\/a><\/p>\n<h2>Machine Identity Risks Go Overlooked<\/h2>\n<p>Another factor that makes machine identities so concerning is that businesses often overlook them. As Coffing points out, the ThroughTrek Kalay breach would not have been as severe had the company had a system to manage its machine identities. Unfortunately, many organizations keep expanding their IoT environments without considering their vulnerabilities.<\/p>\n<p>Even in terms of IoT security, identity management is not always a part of enterprises\u2019 strategies. Regulations like California\u2019s SB-327 strengthen connected device security standards but don\u2019t require identity management schemes. As a result, businesses may feel protected because of their other security steps despite these vulnerabilities remaining.<\/p>\n<p>Organizations may establish an <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">identity and access management (IAM)<\/a> system that applies only to user identities. With more devices than there are users, though, that strategy stops short of what&#8217;s needed. Identity management must also include machines.<\/p>\n<h2>How Enterprise Security Can Adapt to Machine Identity Risks<\/h2>\n<p>While these risks remain prevalent, enterprise security strategies to cope with them are changing. High-profile cyber attacks have brought more attention to the issue, driving organizations to consider their machine identity management.<\/p>\n<p>For now, only businesses with leading cybersecurity strategies feature thorough, companywide machine identity management. Most still lack sufficient tools in this area, even if they are increasingly aware of the risks. According to one study, <a href=\"https:\/\/www.keyfactor.com\/blog\/ciso-insights-why-you-cant-ignore-machine-identities-in-iam-strategy\/\" target=\"_blank\" rel=\"noopener\">42% of organizations have a limited strategy<\/a> that applies only to some applications, while 18% have none at all.<\/p>\n<p>Coffing outlined several considerations for enterprises looking to adapt their security strategies for machine identity risks. Here\u2019s how businesses can protect themselves against these emerging threats.<\/p>\n<h3>Digital Secrets<\/h3>\n<p>\u201cWith the increase in machine identities, security leaders must implement a machine IAM strategy that includes digital secrets,\u201d says Coffing. These secrets typically take the form of a username and password, but security teams must take a different approach to credentials with machine identities. Coffing recommends cryptography and private keys.<\/p>\n<p>Cryptography ensures that sensitive data traveling between devices is unreadable to machines and users that shouldn\u2019t have access to it. Machines must have cryptographic certificates to verify their identity, and only then can they decrypt this data. This key system ensures that only authenticated, authorized devices can access any given data packet.<\/p>\n<p>Coffing also suggests that as part of this strategy, companies use private keys based on open standards. Public key infrastructure (PKI) and Secure Production Identity Framework for Everyone (SPIFFE) provide a roadmap for securing cryptographic communications.<\/p>\n<h3>Authorization Governance Automation<\/h3>\n<p>One challenge enterprises face in machine IAM is growing workforce and resource shortages. The U.S. cybersecurity market currently needs 350,000 additional workers to meet demand, and many companies also lack sufficient IT budgets. Coffing suggests that cybersecurity teams embrace automation to cover these gaps.<\/p>\n<p>\u201cWithout the proper automated software solutions, such as authorization governance, IT teams won&#8217;t be able to manage the massive influx of machine identities on their network,\u201d Coffing said.<\/p>\n<p>Authorization governance automation creates risk profiles for each machine identity based on real-time context. That way, businesses can account for the fact that a device can be trustworthy in one situation but not another.<\/p>\n<p>Automation can handle these identity risk evaluations far faster than human workers. It also gives security teams more time to focus on other tasks, accomplishing more without additional staff.<\/p>\n<h3>Zero Trust Architecture<\/h3>\n<p>Coffing also says <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero-trust security<\/a> is a must for machine identity management. Just as enterprises adopt these policies for their user IAM strategies, they should expand these actions to machine identities. Systems must restrict data access and verify machine identities before authorizing them, regardless of whether or not they appear trustworthy initially.<\/p>\n<p>Businesses must apply these policies to everything, not just behind-the-scenes organizational work. As Coffing said, \u201czero trust is enforced at every transactional decision point when users sign and request access to apps or devices, or when machines exchange data with partners and customers.\u201d<\/p>\n<p>Any data exchange with customers, partners or other third parties must rely on zero trust architecture. Just as businesses should never assume any user is safe, they shouldn\u2019t trust any device until verifying it and only giving it as little information as necessary. These steps will hinder unauthorized network access and reduce data leakage.<\/p>\n<h2>Cybersecurity Strategies Must Include Machine Identities<\/h2>\n<p>Much cybersecurity literature today focuses on human threats, and indeed, users are still a prominent security concern. However, enterprises must not overlook the importance of machine identity management in their cybersecurity strategies.<\/p>\n<p>By following these steps, companies can account for machine identity risks in their broader security infrastructure. They can then expand their device fleets with greater safety.<\/p>\n<p>Further reading: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\">How Zero Trust Security Can Protect Against Ransomware<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d1d84b334-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d1d84b334\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d1d84b334\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d1d84b334\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d1d84b334\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d1d84b334\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d1d84b334\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Managing machine identities has never been more critical to an enterprise&#8217;s cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO of Cloudentity. Without thorough visibility and proper management of machine-to-machine communications, all those machines can become a huge security issue. Gartner\u2019s list of the top security risks and trends [&hellip;]<\/p>\n","protected":false},"author":263,"featured_media":19643,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[21,19,14],"tags":[7750],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[384,375],"class_list":["post-19641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-endpoint","category-networks","tag-identity-and-access-management","b2b_audience-awareness-and-consideration","b2b_product-identity-management-privacy","b2b_product-security-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Machine Identities Can Imperil Enterprise Security | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Enterprises manage the identity of users, but machine identities remain a largely uncontrolled cybersecurity risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Machine Identities Can Imperil Enterprise Security | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Enterprises manage the identity of users, but machine identities remain a largely uncontrolled cybersecurity risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-18T19:38:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Devin Partida\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Devin Partida\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\"},\"author\":{\"name\":\"Devin Partida\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08\"},\"headline\":\"How Machine Identities Can Imperil Enterprise Security\",\"datePublished\":\"2021-10-18T19:38:35+00:00\",\"dateModified\":\"2021-10-18T19:38:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\"},\"wordCount\":1065,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png\",\"keywords\":[\"identity and access management\"],\"articleSection\":[\"Cloud\",\"Endpoint\",\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\",\"name\":\"How Machine Identities Can Imperil Enterprise Security | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png\",\"datePublished\":\"2021-10-18T19:38:35+00:00\",\"dateModified\":\"2021-10-18T19:38:35+00:00\",\"description\":\"Enterprises manage the identity of users, but machine identities remain a largely uncontrolled cybersecurity risk.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png\",\"width\":1000,\"height\":525},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Machine Identities Can Imperil Enterprise Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08\",\"name\":\"Devin Partida\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg\",\"caption\":\"Devin Partida\"},\"description\":\"Devin Partida is a technology and cybersecurity writer whose work has been featured on Entrepreneur, AOL, AT&amp;T's cybersecurity blog and Yahoo! Finance. She is also the Editor-in-Chief of the tech website ReHack.com.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/dpartida\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Machine Identities Can Imperil Enterprise Security | eSecurity Planet","description":"Enterprises manage the identity of users, but machine identities remain a largely uncontrolled cybersecurity risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/","og_locale":"en_US","og_type":"article","og_title":"How Machine Identities Can Imperil Enterprise Security | eSecurity Planet","og_description":"Enterprises manage the identity of users, but machine identities remain a largely uncontrolled cybersecurity risk.","og_url":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/","og_site_name":"eSecurity Planet","article_published_time":"2021-10-18T19:38:35+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png","type":"image\/png"}],"author":"Devin Partida","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Devin Partida","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/"},"author":{"name":"Devin Partida","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08"},"headline":"How Machine Identities Can Imperil Enterprise Security","datePublished":"2021-10-18T19:38:35+00:00","dateModified":"2021-10-18T19:38:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/"},"wordCount":1065,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png","keywords":["identity and access management"],"articleSection":["Cloud","Endpoint","Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/","url":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/","name":"How Machine Identities Can Imperil Enterprise Security | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png","datePublished":"2021-10-18T19:38:35+00:00","dateModified":"2021-10-18T19:38:35+00:00","description":"Enterprises manage the identity of users, but machine identities remain a largely uncontrolled cybersecurity risk.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/10\/machine-identity-e1634585817439.png","width":1000,"height":525},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/cloud\/machine-identity-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How Machine Identities Can Imperil Enterprise Security"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/f30aed096140e77101ea19742c0d8f08","name":"Devin Partida","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/08\/Devin-7-150x150.jpg","caption":"Devin Partida"},"description":"Devin Partida is a technology and cybersecurity writer whose work has been featured on Entrepreneur, AOL, AT&amp;T's cybersecurity blog and Yahoo! Finance. She is also the Editor-in-Chief of the tech website ReHack.com.","url":"https:\/\/www.esecurityplanet.com\/author\/dpartida\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19641"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/263"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=19641"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/19641\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/19643"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=19641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=19641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=19641"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=19641"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=19641"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=19641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}