Please ensure Javascript is enabled for purposes of website accessibility

Tech Research

Why 82% of Your Attack Surface Is Invisible to Your Security Team

August 11, 2025

·

9-Minute Read

Share Article

Here is the security paradox that keeps CISOs awake: Your organization now manages 82 machine identities for every human user, yet most security strategies still treat them as operational afterthoughts. This math is getting impossible – business velocity accelerating while attack surfaces fragment across domains that security teams simply weren't designed to govern.

If you're feeling like you're always one step behind, you're not wrong. And it's not because your team isn't capable or your tools aren't sophisticated enough.

Ratio of Human to Machine Identities in the Enterprise

Ratio of Human to Machine Identities in the Enterprise

The Real Culprit: Your Business Is Creating the Problem

The business itself is creating the attack surface. When Sales adopts Salesforce integrations, they're improving CRM workflows, but they're also granting OAuth tokens broad enterprise access. When DevOps deploys AI-powered automations, they are actually accelerating delivery, but they're also creating service accounts with cross-environment privileges. And when Legal engages a new document vendor, they're not just streamlining contracts, they're also establishing API keys with sensitive, persistent data access.

Business Functions Creating Attack Surface

Business Functions Creating and Expanding the Attack Surface

Each business function optimizes for its own goals, and it should. Because that's how modern business operates. But the problem is, security frameworks simply haven't kept pace.

It’s important to understand that it’s not that business teams are reckless, because they’re not. The actual problem is that security frameworks haven't evolved to match how enterprises actually operate.

The Data That Should Keep You Up at Night

Recent high-profile breaches tell the story: GitHub's Dependabot PATs, Microsoft's 2-year-active SAS token with 38TB access, CloudFlare's unrotated service tokens from the Okta incident, Dropbox Sign's compromised service account. The pattern is pretty clear – attackers have shifted focus from well-defended human identities to under-secured machine identities.

The Pendulum has Swung from Human to Non-Human Identities

Notable enterprises impacted by the over-expanding attack surface of Non-Human Identities

But what’s even more concerning, is that our analysis reveals that the riskiest domains are receiving the least security attention.

Where Security Invests vs. Where Risk Actually Lives

We mapped enterprise NHI attack surfaces across six business domains and found something alarming: security investment is inversely correlated with actual risk.

Corporate IT, the most mature and manageable domain—gets the majority of security attention and tooling. Decades of investment in Active Directory, PAM solutions, EDR, and network monitoring have created well-understood RBAC models with established governance processes. Its risk level is Low.

Varying Investment and Risk Levels Across Business Terrains

Varying Investment and Risk Levels Across Business Terrains

Meanwhile, AI and Development domains operate with immature security practices, explosive credential growth, and minimal governance, yet they receive a fraction of security focus. Their risk level is Critical.

The Domain Risk Breakdown

Our analysis reveals a clear misalignment between where security teams focus their attention and where the greatest NHI risks actually exist. The domains creating the most machine identities with the least oversight represent critical blind spots that attackers are increasingly exploiting.

Risk Matrix by Domain

Risk Matrix by Domain

AI Domain (Critical Risk)

The AI Domain represents the highest risk due to its explosive growth and immature security practices. Organizations are rapidly deploying AI systems and agents without established governance frameworks, creating sprawling populations of machine identities with elevated privileges. LLMs may inadvertently learn and reproduce credentials from training data, while AI agents accumulate broad organizational access with minimal oversight. Most concerning is the lack of AI-specific security solutions and policies, leaving this rapidly expanding attack surface largely undefended.

Development Domain (High Risk)

The Development Domain operates under constant tension between velocity and security, with convenience often winning. Secret scanning tools remain fragmented across the development lifecycle, while massive distributions of credentials scatter across repositories and pipelines. Developer autonomy requirements frequently conflict with security controls, and Git history preserves leaked secrets indefinitely. This creates an environment where hardcoded credentials and poor secret hygiene practices persist despite their known risks.

Supply Chain Domain (Moderate-High Risk)

The Supply Chain Domain presents unique challenges due to limited organizational control over third-party security practices. Complex chains of integrations create cascading access relationships that are difficult to map and secure. Vendor access often continues beyond business relationships, creating dormant attack vectors. The growing reliance on SaaS integrations and cloud service providers amplifies these risks, as organizations must trust external parties to manage shared credentials properly.

User Domain (Moderate Risk)

The User Domain generates significant NHI populations through daily productivity activities, with every user creating multiple machine identities. While users remain susceptible to social engineering attacks that can grant excessive permissions to malicious applications, improving security tooling including CASB, EDR, and Secure Browsers provides increasing mitigation. User-generated NHIs typically inherit limited creator permissions, naturally constraining potential blast radius.

Production Domain (Moderate-Low Risk)

The Production Domain benefits from modern cloud IAM systems with built-in least privilege capabilities and Infrastructure-as-Code practices that enable consistent security control deployment. Production issues receive immediate attention and resources, ensuring rapid response to security concerns. However, many organizations still rely on long-lived access keys and client secrets that lack proper rotation and lifecycle management, creating persistent vulnerabilities in otherwise secure environments.

Corporate IT Domain (Low Risk)

The Corporate IT Domain represents the most mature and manageable security environment, benefiting from decades of investment in established security platforms. Well-understood RBAC models and mature audit processes provide strong governance frameworks, while the domain remains relatively contained with clearly defined infrastructure boundaries. The primary risk stems from older systems that may lack integration with modern security controls, but these gaps are generally well-understood and manageable.

Why Technical Terrain Thinking Fails

Traditional security frameworks focus on technical terrains: cloud, SaaS, on-prem. But business functions don't map to infrastructure boundaries.

User productivity spans multiple clouds. Development cycles touch every environment. AI initiatives require access across data silos. Supply chain relationships create trust pathways that bypass your perimeter entirely.

Security needs to understand how business domains create and manage NHIs, not just where the credentials technically reside. When you think in technical terrains, you miss the business context that determines actual risk—who created this credential, why, what it accesses, and how it fits into business workflows.

This isn't just a visibility problem. It's a fundamental misalignment between how security thinks about risk and how business creates it. It's time to stop securing infrastructure and start securing intent.

The Hidden Cost of Misaligned Security Investment

Here's the business impact you need to communicate to leadership:

In AI and Development domains (your highest-risk areas):

  • Average secret remediation costs $2,880 per incident (based on Clutch findings)
  • Development teams lose 25% productivity to security incidents (based on Clutch findings)
  • AI systems granted broad organizational data access with minimal oversight
  • Version control systems preserve secrets indefinitely, creating long-term exposure

Meanwhile, in Corporate IT (your most secure domain):

  • Over-investment in mature solutions with diminishing returns
  • Tool sprawl without corresponding risk reduction
  • Security team bandwidth consumed by low-risk, high-visibility issues

The math is brutal: Our analysis suggests that up to 60% of NHI security resources are allocated to domains like Corporate IT—which represent only 15% of total domain-level risk.

The Ripple Effect: How Domain Compromise Cascades

Understanding domain risk is really not just about isolated threats, but about how compromise in a single domain enables lateral movement and privilege escalation across your entire enterprise.

AI Domain compromise begins when attackers manipulate AI agents or compromise their API keys, gaining access to the broad organizational data these systems require for training and operation. This data access reveals sensitive information including internal system architectures, user credentials, and business processes that enable attackers to identify high-value targets within the organization. Armed with this intelligence and the AI system's existing privileges, attackers can then move laterally to development environments where AI models are trained and deployed, eventually reaching production systems that host or integrate with these AI services.

Development Domain compromise starts when attackers gain access to a developer's workstation through phishing or malware, immediately harvesting stored credentials, SSH keys, and API tokens from their local environment. These credentials provide direct access to code repositories and CI/CD pipelines, where attackers discover additional hardcoded secrets that grant access to production databases and cloud environments. Using their production access and the intelligence gathered from source code, attackers can then target user-facing applications to harvest user credentials and eventually move into Corporate IT systems through compromised user accounts or shared infrastructure.

This isn't in theory. We've seen this exact progression in recent breaches where initial NHI compromise in high-risk domains led to enterprise-wide incidents.

The Executive Action Plan: What You Need to Do Now

Immediate Actions (0-90 Days): Focus on your critical blind spots

  1. Conduct AI Domain Assessment: Inventory AI systems and their data access patterns
  2. Development Domain Secret Scan: Identify and rotate hardcoded credentials in repositories
  3. Establish Cross-Domain Monitoring: Deploy behavioral analysis for high-risk NHIs

Short-Term Strategy (3-12 Months): Build domain-specific governance

  1. Deploy AI-Specific Controls: Implement governance frameworks for AI agent proliferation
  2. Development Security Integration: Embed security into development workflows without killing velocity
  3. Supply Chain NHI Management: Establish vendor credential lifecycle management

Long-Term Transformation (12+ Months): Achieve security-business alignment

  1. Zero Trust for NHIs: Implement continuous verification across all domains
  2. Automated Security Orchestration: Deploy AI-driven threat detection and response
  3. Business Function Integration: Embed security into business processes rather than bolting it on

Beyond Adding More Tools

This isn't about adding more tools to your security stack. Most CISOs already have tool fatigue. It's about aligning security strategy with business reality and focusing investment where risk actually lives.

The solution isn't to slow down business functions—that's a losing battle in competitive markets. Instead, security needs to work with business domains, understanding how they operate and building controls that enable rather than impede business outcomes.

The bottom line: Organizations that begin systematic NHI security initiatives aligned with business domains will be significantly better positioned to defend against this evolving threat landscape while maintaining operational efficiency.

What's Coming Next

Over the next seven days, we'll dive deep into each domain with actionable insights:

  • Day 1: User Domain—How employee productivity creates distributed attack surfaces
  • Day 2: Corporate IT Domain—Leveraging your most mature security foundation
  • Day 3: Supply Chain Domain—Managing trust relationships that extend beyond your perimeter
  • Day 4: Development Domain—Balancing velocity with security in high-risk environments
  • Day 5: Production Domain—Mission-critical security without operational disruption
  • Day 6: AI Domain—Governing the wild west of autonomous systems and agent proliferation
  • Day 7: Implementation Roadmap—Your strategic framework for domain-aligned security

Each post includes specific risk assessments, current-state challenges, and actionable recommendations for security leaders who need to balance business enablement with risk management.

Want the complete analysis now? Download our full research paper: "Mapping the Enterprise Non-Human Identity Attack Surface: A Strategic Security Analysis" for the comprehensive framework, detailed risk assessments, and implementation roadmap.

About this series: This week-long exploration examines how business functions create NHI attack surfaces and provides actionable frameworks for security leaders who need to balance business enablement with risk management, based on comprehensive analysis of enterprise domains, attack patterns, and strategic risk assessment.

CTA Image
Secure Non-Human Identities. Everywhere.
Author

About the author

Ofir is the Co-Founder and CEO of Clutch Security. With over 15 years of experience in cybersecurity, including leadership roles at Sygnia and Hunters, he’s helped global enterprises respond to the most advanced cyber threats. At Clutch, Ofir is focused on tackling one of the industry’s most overlooked risks: securing the explosion of Non-Human Identities across modern infrastructure.