Back to Top 10
Illustration for Improper Access Control
NHI7:2025
Improper Access Control
Inadequate or misconfigured access controls for non-human identities.

Details

Improper access control can lead to non-human identities gaining unauthorized access to sensitive resources or performing actions beyond their intended scope. This risk often arises from misconfigured permissions, overly broad access policies, or a lack of granular control.

Video Explanation

Enhance Your Security Posture

Enhance Your Security Posture

Learn how to protect your non-human identities and strengthen your overall cybersecurity strategy.

Get Started

Example Scenario

HealthTech Solutions develops a revolutionary AI-driven diagnostic tool for hospitals. To train their model, they set up a data pipeline that pulls anonymized patient records from various health institutions. Due to a misconfiguration in their access controls, the AI service account gains write access to the source databases instead of read-only access. During a routine update, a bug in the AI system causes it to write corrupted data back to the source databases. This leads to numerous misdiagnoses and incorrect treatments before the error is caught. The incident results in potential harm to patients, multiple malpractice lawsuits against the hospitals, and a federal investigation into HealthTech Solutions' data handling practices.

Mitigation Strategies

  • Implement the principle of least privilege for all non-human identities
  • Use role-based access control (RBAC) and attribute-based access control (ABAC)
  • Regularly review and audit access permissions

Best Practices

  • Implement segregation of duties for critical systems
  • Use just-in-time (JIT) access for elevated permissions
  • Conduct regular access reviews and revoke unnecessary permissions

References

Related Risks

Improper Offboarding

Inadequate deactivation or removal of non-human identities when no longer needed....

Learn More about Improper OffboardingLearn more about Improper Offboarding
Secret Leakage

Unintended exposure of sensitive non-human identity credentials to unauthorized parties....

Learn More about Secret LeakageLearn more about Secret Leakage
Excessive Permissions

Non-human identities are granted more permissions than necessary for their intended functions....

Learn More about Excessive PermissionsLearn more about Excessive Permissions
Inadequate Rotation

Failure to regularly update or rotate credentials for non-human identities....

Learn More about Inadequate RotationLearn more about Inadequate Rotation