The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither seen nor governed - already exceeds what organizations think they manage(57% vs. 43% in the study). That is not a minor technical item; it is the basis on which autonomous IA agents are supported today that, in seeking shortcuts, can exploit exactly those shadows: uninvented local accounts, embossed credentials and large and reusable tokens.
The combination of massive deployment of Agent AI and a poorly managed identity surface is the perfect storm. These agents are designed to optimize tasks and, when they find obstacles, prefer fast routes: reuse a more privileged token, read a flat text credential or invoke a local service account. That an IA can access something doesn't mean I should do it. and the difference is marked by policies, controls and the hygiene of identities.

The consequences have already had visible effects this year: interruptions in cloud services and leaks that, in many cases, had as vector identities with excessive permissions or orphan accounts. But beyond availability, the risks include data theft, lateral movement within the network, escalation of automated privileges and regulatory exposure that can result in fines and loss of confidence.
If your organization does not have updated inventories of non-human identities, it is losing visibility on a critical part of the attack surface. Two initial priorities are to identify and classify: to know what accounts exist, to what resources they access and how broad these permits are.. Identifying tools and automated scanning of repositories and applications reduce the armo-spot and allow prioritizing of remediations.
Technical measures that reduce risk to self-employed agents are well known but poorly applied: centralized management of machine identities, use of managed secrets (not secret in flat text), ephemeral credentials (tokens OIDC or temporary roles), minimum privilege principles and Just-In-Time access. Implementing them is not only good practice: it is essential. To deepen the principles of defense in identity and architecture of trust, see frameworks such as NIST's on IA and good identity security practices in the framework of the Zero Trust of CISA: NIST - AI and Technology and CISA - Zero Trust Maturity Model.
The problem of orphan accounts and excessive permits requires organizational processes as well as technology. Automating low accounts, periodic reviews of entries and formal warning processes drastically reduces risk. Do not wait for an audit or incident: implement approval flows, automatic expiry of privileges and reconciliation between the central directory and local application identities.
In addition to preventing, it is necessary to detect. IA agents can move at speeds that exceed manual operations, so It is essential to apply detection based on behavior and event correlation: alerts for unusual use of tokens, off-schedule access, account creation from pipelines or repositories, and cross-sectional movements between environments. Integrating identity telemetry with IMS and EDR systems provides early responses.

To govern the use of Agent AI, it is appropriate to establish specific security guards: access policies per agent, sandbox environments for testing, rules for signing and deploying models, and monitoring of interaction phrases that indicate attempts to circumvent. Governance must include human approval for out-of-reach actions and immutable records of automated decisions; traceability is the only way to audit actions of self-employed actors.
The remediation work can be fractal: not everything is fixed at once. Start so you can produce more immediate risk reduction: privileged accounts, multi-environment tokens and code credentials. From there, implement continuous cycle of discovery, control and measurement. Measuring "dark matter" and its reduction in time offers the direction a specific risk improvement KPI.
Finally, the preparation is not only technical but cultural: development teams, operations and security should be formed in secure identity practices and in the particularities of the behaviour of IA agents. Software design decisions (avoid storage of secrets in repositories, use managed identities) and service level agreements with cloud suppliers are critical components. If you need a practical starting point, the guides and public frameworks mentioned above are good references and should be combined with a continuous internal evaluation.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

PinTheft the public explosion that could give you root on Arch Linux
A new public explosion has brought to the surface again the fragility of the Linux privilege model: the V12 Security team named the failure as PinTheft and published a concept t...