Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Why Organizations Are Abandoning Static Secrets for Managed Identities

Posted on October 23, 2025October 23, 2025 By CWS

Oct 23, 2025The Hacker NewsDevOps / Information Safety
As machine identities explode throughout cloud environments, enterprises report dramatic productiveness good points from eliminating static credentials. And solely legacy techniques stay the weak hyperlink.
For many years, organizations have relied on static secrets and techniques, resembling API keys, passwords, and tokens, as distinctive identifiers for workloads. Whereas this strategy offers clear traceability, it creates what safety researchers describe as an “operational nightmare” of guide lifecycle administration, rotation schedules, and fixed credential leakage dangers.
This problem has historically pushed organizations towards centralized secret administration options like HashiCorp Vault or CyberArk, which give common brokers for secrets and techniques throughout platforms. Nonetheless, these approaches perpetuate the elemental drawback: the proliferation of static secrets and techniques requiring cautious administration and rotation.
“Having a workload in Azure that should learn information from AWS S3 isn’t best from a safety perspective,” explains one DevOps engineer managing a multicloud setting. “Cross-cloud authentication and authorization complexity make it onerous to set this up securely, particularly if we select to easily configure the Azure workload with AWS entry keys.”
The Enterprise Case for Change
Enterprise case research doc that organizations implementing managed identities report a 95% discount in time spent managing credentials per utility element, together with a 75% discount in time spent studying platform-specific authentication mechanisms, leading to a whole lot of saved hours yearly.
However find out how to strategy the transition, and what prevents us from totally eliminating static secrets and techniques?
Platform-Native Options
Managed identities signify a paradigm shift from the standard “what you could have” mannequin to a “who you might be” strategy. Somewhat than embedding static credentials into purposes, trendy platforms now present identification companies that subject short-lived, mechanically rotated credentials to authenticated workloads.

The transformation spans main cloud suppliers:

Amazon Net Companies pioneered automated credential provisioning by IAM Roles, the place purposes obtain non permanent entry permissions mechanically with out storing static keys
Microsoft Azure gives Managed Identities that enable purposes to authenticate to companies like Key Vault and Storage with out builders having to handle connection strings or passwords
Google Cloud Platform offers Service Accounts with cross-cloud capabilities, enabling purposes to authenticate throughout completely different cloud environments seamlessly
GitHub and GitLab have launched automated authentication for growth pipelines, eliminating the necessity to retailer cloud entry credentials in growth instruments

The Hybrid Actuality
Nonetheless, the fact is extra nuanced. Safety specialists emphasize that managed identities do not remedy each authentication problem. Third-party APIs nonetheless require API keys, legacy techniques typically cannot combine with trendy identification suppliers, and cross-organizational authentication should require shared secrets and techniques.

“Utilizing a secret supervisor dramatically improves the safety posture of techniques that depend on shared secrets and techniques, however heavy use perpetuates the usage of shared secrets and techniques relatively than utilizing sturdy identities,” in accordance with identification safety researchers. The objective is not to remove secret managers totally, however to dramatically scale back their scope.
Good organizations are strategically lowering their secret footprint by 70-80% by managed identities, then utilizing strong secret administration for remaining use circumstances, creating resilient architectures that leverage one of the best of each worlds.
The Non-Human Id Discovery Problem
Most organizations do not have visibility into their present credential panorama. IT groups typically uncover a whole lot or hundreds of API keys, passwords, and entry tokens scattered throughout their infrastructure, with unclear possession and utilization patterns.
“You possibly can’t change what you possibly can’t see,” explains Gaetan Ferry, a safety researcher at GitGuardian. “Earlier than implementing trendy identification techniques, organizations want to know precisely what credentials exist and the way they’re getting used.”
GitGuardian’s NHI (Non-Human Id) Safety platform addresses this discovery problem by offering complete visibility into current secret landscapes earlier than managed identification implementation.
The platform discovers hidden API keys, passwords, and machine identities throughout total infrastructures, enabling organizations to:

Map dependencies between companies and credentials
Determine migration candidates prepared for managed identification transformation
Assess dangers related to present secret utilization
Plan strategic migrations relatively than blind transformations

Discovered this text fascinating? This text is a contributed piece from considered one of our valued companions. Observe us on Google Information, Twitter and LinkedIn to learn extra unique content material we submit.

The Hacker News Tags:Abandoning, Identities, Managed, Organizations, Secrets, Static

Post navigation

Previous Post: Jira Software Vulnerability Let Attacker Modify Any Filesystem Path Writable By JVM process
Next Post: Exploitation of Critical Adobe Commerce Flaw Puts Many eCommerce Sites at Risk

Related Posts

New Supply Chain Malware Operation Hits npm and PyPI Ecosystems, Targeting Millions Globally The Hacker News
Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Hacker News
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks The Hacker News
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials The Hacker News
China-Linked Hackers Exploit SAP and SQL Server Flaws in Attacks Across Asia and Brazil The Hacker News
CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Russian Government Now Actively Managing Cybercrime Groups: Security Firm
  • AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk
  • Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild
  • Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
  • CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Russian Government Now Actively Managing Cybercrime Groups: Security Firm
  • AI Sidebar Spoofing Puts ChatGPT Atlas, Perplexity Comet and Other Browsers at Risk
  • Hackers Exploiting Adobe Magento RCE Vulnerability Exploited in the Wild
  • Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
  • CISA Warns of Motex LANSCOPE Endpoint Manager Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News