Non-Human Identity Security: Why Machine Identities Are the New Attack Surface
Автор: OASIS Security
Загружено: 2026-02-05
Просмотров: 46
Описание:
Machine identities now outnumber human users and attackers are actively exploiting them. Service accounts, API keys, CI/CD credentials, and cloud workloads often hold broad access with little ownership, visibility, or governance.
In this Identity Management Day 2025 EMEA session, Adam Ochayon, Director of Product Strategy and Go-to-Market at Oasis Security, explains why non-human identities have become the fastest-growing identity attack surface and why traditional IAM approaches fail to control them.
What you will learn (and how to apply it)
Why non-human identities are now the weakest link in enterprise identity security
How machine identity sprawl forms across DevOps, cloud, and IT teams
The specific failure modes attackers exploit, including unrotated secrets and over-privileged service accounts
A practical governance model security teams can use immediately
The Five W’s framework for non-human identity governance:
🔸Who owns each machine identity and how to enforce accountability
🔸What permissions each identity truly needs to operate safely
🔸When identities should be active and how to baseline normal behavior
🔸Where identities operate across environments and dependencies
🔸Why an identity exists and when it should be removed
Resources
Learn More About Oasis Security: https://www.oasis.security/
Connect with Adam Ochayon: / adamochayon
#IdentityManagementDay2025 #IAM #NonHumanIdentity #Cybersecurity #CloudSecurity #OasisSecurity #IdentitySecurity
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: