Please ensure Javascript is enabled for purposes of website accessibility

Identity Not Vaulted

Risk Category

Storage

Risk Description

Unvaulted NHIs are a major security risk. Discover how secure vaulting can protect against credential leaks and unauthorized access.

Why It’s a Risk

Non-vaulted identities are more accessible to attackers, particularly if they are stored in insecure environments like plaintext or unmonitored storage systems. The lack of encryption or access controls exacerbates this risk, making it easier for attackers to compromise sensitive credentials.

Likelihood of Occurrence

moderate

Medium, particularly in legacy systems or environments without strong vaulting policies.

Impact Level

moderate

Medium, as non-vaulted identities are more vulnerable to theft and misuse.

Mitigation Strategy

Ensure that all identities are stored in secure vaults with continuous monitoring, encryption, and strict access controls. Regular audits should be performed to protect any previously non-vaulted identities. However, keep in mind that simply storing NHIs in a vault is not sufficient for complete security. While vaults offer secure storage, they do not monitor how identities are used outside the vault, detect potential misuse, or provide visibility into their entire lifecycle. This lack of oversight can allow compromised NHIs to go undetected. To fully safeguard NHIs, integrate your vault strategy with a comprehensive security approach that includes continuous visibility, behavior monitoring, and context-aware analytics to secure and manage NHIs throughout their lifecycle. Implement Zero Trust validation for all access requests, ensuring that even if identities are exposed, they cannot be used without proper authorization.

Playbooks in Clutch

110

Applies for:

Cloud Service Provider

AWS
Azure
Google Cloud Platform

Vault

AWS Secrets Manager
GCP Secret Manager
Hashicorp Vault

Source Manager

Bitbucket
GitHub
GitLab

CI/CD

CircleCI
GitHub Actions
Jenkins
TeamCity

Password Manager

1Password
LastPass

EDR

Crowdstrike
SentinelOne
Microsoft Defender

Data

AWS Redshift
MongoDB Atlas
MySQL
PostgreSQL
Snowflake

Network

Akamai
Cloudflare

PaaS

Azure Kubernetes Service
Amazon Elastic Kubernetes Service
Google Kubernetes Engine
Kubernetes

Collaboration

Atlassian Confluence
Notion

Project Management

Atlassian Jira

Log Analytics

Datadog
Elastic
Splunk

IDP

Google Workspace
JumpCloud
Microsoft Entra ID
Okta

CRM

Hubspot
Salesforce

MDM

Microsoft Intune
Jamf

IM

Microsoft Teams
Snowflake

Ticketing

ServiceNow
Zendesk

Automation

Tines
Torq

HRIS

BambooHR
HiBob

SIEM

Exabeam (Logrhythm)
Sumo Logic

Stay Secure Without the Hassle of Rotations: Clutch’s Zero Trust & Ephemeral Identity Approach.