Please ensure Javascript is enabled for purposes of website accessibility

Identity Multi-Used

Risk Category

Usage

Risk Description

Using the same NHI across different systems increases your risk. Discover best practices to separate identity use and cut down the attack surface!

Why It’s a Risk

When an identity is used in multiple environments, a compromise in one location could lead to unauthorized access across all connected systems. This increases the attack surface and can lead to broader security breaches, downtime, and damage. Additionally, managing the lifecycle of multi-used identities becomes more complex, making it harder to track and secure.

Likelihood of Occurrence

moderate

Medium, especially in complex environments with shared services or widespread API usage.

Impact Level

high

High, as a compromise in one location can lead to a broader security breach across connected systems.

Mitigation Strategy

Regularly audit and track identities used across multiple locations. Segregate identity usage to minimize the blast radius of a potential breach, and consolidate identities into secure environments where necessary. Apply Zero Trust principles to continuously verify the legitimacy of access requests, ensuring that even if one system is compromised, the impact remains contained.

Playbooks in Clutch

110

Applies for:

Cloud Service Provider

AWS
Azure
Google Cloud Platform

Vault

AWS Secrets Manager
GCP Secret Manager
Hashicorp Vault

Source Manager

Bitbucket
GitHub
GitLab

CI/CD

CircleCI
GitHub Actions
Jenkins
TeamCity

Password Manager

1Password
LastPass

EDR

Crowdstrike
SentinelOne
Microsoft Defender

Data

AWS Redshift
MongoDB Atlas
MySQL
PostgreSQL
Snowflake

Network

Akamai
Cloudflare

PaaS

Azure Kubernetes Service
Amazon Elastic Kubernetes Service
Google Kubernetes Engine
Kubernetes

Collaboration

Atlassian Confluence
Notion

Project Management

Atlassian Jira

Log Analytics

Datadog
Elastic
Splunk

IDP

Google Workspace
JumpCloud
Microsoft Entra ID
Okta

CRM

Hubspot
Salesforce

MDM

Microsoft Intune
Jamf

IM

Microsoft Teams
Snowflake

Ticketing

ServiceNow
Zendesk

Automation

Tines
Torq

HRIS

BambooHR
HiBob

SIEM

Exabeam (Logrhythm)
Sumo Logic

Stay Secure Without the Hassle of Rotations: Clutch’s Zero Trust & Ephemeral Identity Approach.