In modern companies there is a silent and dangerous layer that rarely appears in the reports: accounts that were left behind when people, services or systems ceased to be part of the organization. These abandoned identities are not always the result of negligence, but of accelerated growth and technological fragmentation: applications that were never fully integrated into identity management systems, inherited environments with local accounts and a proliferation of non-human identities - such as service accounts, APIs, bots and IA processes - operating outside the radar of traditional tools.
Orphan accounts are open doors. They retain valid credentials, sometimes with high privileges, and most alarming: without a clear owner who can close or monitor them. That gap in visibility is exactly what the attackers exploit. Public cases confirm this, such as the Pipeline Colonial incident in 2021, where an old remote access account without multifactor authentication was the point of entry of the attack ( report in DarkReading).

The mechanics behind the problem is not always obvious. The classic systems of IAM (access and identity management) and IGA (identity government) platforms are designed primarily for human users and require manual configurations by application: connectors, scheme mapping, permit catalogues and role modelling. Many applications do not go through this process; others are never prioritized during mergers and acquisitions. At the same time, so-called non-human identities - which industry also calls "machine identities" - often lack a managed life cycle, leaving them without clear controls. Microsoft describes the existence of service accounts and their particularities in its technical documentation ( Microsoft documentation).
The consequences are multiple and real. Beyond the direct risk of intrusion, the accumulation of inactive or unowned accounts increases regulatory exposure by failing to comply with principles such as the minimum privilege and disarrangement practices that require standards such as ISO 27001 ( ISO), PCI DSS ( PCI Security Standards) or EU cybersecurity requirements under NIS2 ( information about NIS2). In addition, during fusion and acquisition processes, thousands of obsolete accounts and tokens, including many third-party partners, are often raised, which complicates consolidation and increases the attack surface.
Recent stories illustrate this: in reported incidents, malicious actors have taken advantage of third-party accounts or "ghost accounts" to move laterally, as described by an analysis of an attack with Akira ransomware in a security operations report ( analysis of Barracuda). These examples stress that threats come not only from neglected users, but also from operational complexity and lack of visibility about unmanaged identities.
In view of this, the traditional response - regular manual reviews of accounts and permit lists - is no longer enough. What is needed is a layer of continuous observability that allows to see, correlate and check each identity and its behavior, whether human or not. This vision requires to extract activity signals directly from applications and platforms, to relate them to incorporation or low events, to authentication logs and to real use patterns. Only in this way can one distinguish a legitimate account that was not used in months for valid reasons from a truly orphan and dangerous account.
Identity telemetry and a unified audit trail are key tools: collect events continuously, normalize and connect them with property information and role context transforms assumptions into evidence. On this basis it is feasible to build identity profiles that indicate who used which resource, when and for what purpose, and automate decisions such as marking or disabling accounts without documented activity. The objective is not to replace existing IAM systems, but to provide them with a verifiable data layer that supports governance decisions.
Implementing this approach involves technical and organizational challenges: integrating telemetry into heterogeneous systems, ensuring the integrity and proper retention of forensic audit logs, and defining clear ownership and lifecycle criteria for non-human identities. The companies that have advanced in this area have done so by combining automatic log intake with correlation rules and workflows that notify those responsible - or automatically deactivate - accounts that lack activity and owner.
This type of practice also improves operational efficiency and reduces indirect costs: reduce inactive licences, minimize audit noise and accelerate incident response by more quickly narrowing what accounts existed and how they were used. Cybersecurity organizations and authorities recommend prioritizing identity hygiene as part of an in-depth defence strategy; CISA and other agencies offer resources and frameworks to improve the security position in secure account management and configuration aspects ( CISA resources).

The arrival of IA agents acting in a semi-autonomous way adds another layer of complexity: these processes can create tokens, run APIs and move between services without a clear human owner, which forces them to be included in the identity catalogue and subject to governance rules. The security community is beginning to adapt "machine identity" management practices to address precisely these scenarios, recognizing that not all identities should be managed just like a human user.
In short, the necessary transformation is to move from specific audits and assumptions to continuous evidence-based monitoring. Only with this visibility can orphan accounts - a liability hidden in many infrastructure - be converted into manageable objects, with clear owners, justified permissions and controlled life cycles. Technology and practices to achieve this already exist; what is lacking in many organizations is to prioritize this layer of observability as a central part of the security and compliance strategy.
If you want to deepen how these approaches work in practice, in addition to the links mentioned, you can consult analysis and technical guides on identity governance and service account management in specialized documentation and case studies. And for those looking for examples of commercial solutions that propose a unified continuous audit layer on applications and telemetry, there are emerging suppliers that are focusing their products precisely on closing this gap of visibility. For a professional starting point on the problem and possible answers, Roy Katmor's article in Orchid Security offers a direct view from the industry ( profile of Roy Katmor).
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...