Old and unused passwords are posing a major threat to businesses

Experts have warned many businesses are safeguarding their cloud applications with passwords that are a year old, if not older, and some even have unused, ancient accounts that are still active, posing a worrying security risk.

In its State of Cloud Security 2024 report, Datadog notes that although it is often stressed businesses should refresh passwords (roughly once in three months is something of an industry-standard these days), it found 62% of Google Cloud service accounts, 60% of AWS IAM accounts, and 46% of Microsoft Entra ID applications, have access keys older than a year.

On average, almost half (46%) of businesses have unmanaged accounts with long-lived credentials.

Major risk

“The findings from the State of Cloud Security 2024 suggest it is unrealistic to expect that long-lived credentials can be securely managed,” said Andrew Krug, Head of Security Advocacy at Datadog. “In addition to long-lived credentials being a major risk, the report found that most cloud security incidents are caused by compromised credentials. To protect themselves, companies need to secure identities with modern authentication mechanisms, leverage short-lived credentials and actively monitor changes to APIs that attackers commonly use.”

Krug argues long-lived cloud credentials, which never expire, are often leaked with source code, container images, build logs, and application artifacts. As such, they grant treat actors easy access to company assets. The problem could be solved relatively easily by pivoting towards biometric authentication, zero-trust architecture, and upgrading the logging and monitoring tools and mechanisms.

Passwords are still the number one authentication method for the majority of businesses around the world, despite it being proven as inadequate time and time again. These days most service providers, including the giants of the industry, are actively promoting passkeys, biometric authentication, and the inclusion of multi-factor authentication (MFA) as means of reinforcing what would otherwise be weak protection.

The rise of identity-related cyberattacks: costs, challenges and the role of AIHere’s a list of the best firewalls todayThese are the best endpoint protection tools right now

Related posts

ICYMI: the week’s 7 biggest tech stories from Casio’s smart ring watch to YouTube’s Spotify Wrapped

MIT researchers say nanoscale 3D transistors made from ultrathin semiconductor materials promise more efficient electronics; quantum mechanics offers a path beyond silicon limits

Netflix removes AI art poster for Arcane after an outcry from creators

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More