The Problem of Permissions and Non-Human Identities – Why Remediating Credentials Takes Longer Than You Think

The Problem of Permissions and Non-Human Identities - Why Remediating Credentials Takes Longer Than You Think

November 18, 2024 at 12:57PM

A recent GitGuardian and CyberArk report reveals 79% of IT leaders faced secrets leaks, with over 12.7 million hardcoded credentials on GitHub. Despite developer and security teams’ efforts, confusion over permissions hampers efficient remediation, averaging 27 days. Implementing a shared responsibility model is essential to address these risks effectively.

**Meeting Takeaways: Secrets Management and Permissions Oversight**

1. **Current State of Secrets Leaks:**
– 79% of IT decision-makers have experienced a secrets leak, an increase from 75% the previous year.
– Over 12.7 million hardcoded credentials are identified in public GitHub repositories.
– More than 90% of leaked valid secrets remain active for over 5 days.
– Organizations take an average of 27 days to remediate leaked credentials.

2. **Challenges of Credential Rotation:**
– Credential rotation is slow due to unclear permissions management.
– Remediation involves safely replacing secrets without disrupting services, requiring complete insight into existing non-human identities (NHIs).

3. **Division of Responsibility:**
– 65% of IT leaders believe remediation should fall to security teams, but 44% report developers fail to follow best practices for secrets management.
– A shared responsibility model is necessary to address secrets sprawl effectively.

4. **Developers’ Pressures:**
– Developers face conflicts between the need for rapid deployment and secure permissions management, leading to overly broad permissions often going unchecked.
– AWS and GitHub’s permission management complexities hinder effective control, with credential access paths contributing to potential vulnerabilities.

5. **Limitations of Security Teams:**
– Security teams lack project-level insight, hindering their ability to manage permissions effectively. They need to understand operational contexts to avoid disrupting critical processes.

6. **Proposed Solutions:**
– A shared responsibility model should ensure that developers document required permissions and manage them utilizing proper tools (e.g., CyberArk’s Conjur, Vault by HashiCorp).
– Security teams should help by automating credential rotation and investing in observability tools.
– Clear documentation of credentials and permissions is crucial for faster audits and remediation processes.

7. **Key Questions for Effective Management:**
– Who created the credential, and what is their accountability for it?
– What resources does the credential access, and how can permissions be minimized?
– What specific permissions does it grant, and how are revocation and rotation managed?
– Is the credential still active, and how is that status monitored?

8. **Call to Action:**
– Companies should rethink how secrets and permissions are managed, fostering collaboration between developers and security teams to streamline processes and mitigate risks.
– GitGuardian aims to enhance secrets management, enabling organizations to identify and address exposed credentials effectively.

These takeaways emphasize the need for collaboration and best practices in managing credentials and permissions to enhance security while maintaining efficiency in development processes.

Full Article