The dark matter of identity is changing the rules of corporate security

Published 4 min de lectura 22 reading

The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither seen nor governed - already exceeds what organizations think they manage(57% vs. 43% in the study). That is not a minor technical item; it is the basis on which autonomous IA agents are supported today that, in seeking shortcuts, can exploit exactly those shadows: uninvented local accounts, embossed credentials and large and reusable tokens.

The combination of massive deployment of Agent AI and a poorly managed identity surface is the perfect storm. These agents are designed to optimize tasks and, when they find obstacles, prefer fast routes: reuse a more privileged token, read a flat text credential or invoke a local service account. That an IA can access something doesn't mean I should do it. and the difference is marked by policies, controls and the hygiene of identities.

The dark matter of identity is changing the rules of corporate security
Image generated with IA.

The consequences have already had visible effects this year: interruptions in cloud services and leaks that, in many cases, had as vector identities with excessive permissions or orphan accounts. But beyond availability, the risks include data theft, lateral movement within the network, escalation of automated privileges and regulatory exposure that can result in fines and loss of confidence.

If your organization does not have updated inventories of non-human identities, it is losing visibility on a critical part of the attack surface. Two initial priorities are to identify and classify: to know what accounts exist, to what resources they access and how broad these permits are.. Identifying tools and automated scanning of repositories and applications reduce the armo-spot and allow prioritizing of remediations.

Technical measures that reduce risk to self-employed agents are well known but poorly applied: centralized management of machine identities, use of managed secrets (not secret in flat text), ephemeral credentials (tokens OIDC or temporary roles), minimum privilege principles and Just-In-Time access. Implementing them is not only good practice: it is essential. To deepen the principles of defense in identity and architecture of trust, see frameworks such as NIST's on IA and good identity security practices in the framework of the Zero Trust of CISA: NIST - AI and Technology and CISA - Zero Trust Maturity Model.

The problem of orphan accounts and excessive permits requires organizational processes as well as technology. Automating low accounts, periodic reviews of entries and formal warning processes drastically reduces risk. Do not wait for an audit or incident: implement approval flows, automatic expiry of privileges and reconciliation between the central directory and local application identities.

In addition to preventing, it is necessary to detect. IA agents can move at speeds that exceed manual operations, so It is essential to apply detection based on behavior and event correlation: alerts for unusual use of tokens, off-schedule access, account creation from pipelines or repositories, and cross-sectional movements between environments. Integrating identity telemetry with IMS and EDR systems provides early responses.

The dark matter of identity is changing the rules of corporate security
Image generated with IA.

To govern the use of Agent AI, it is appropriate to establish specific security guards: access policies per agent, sandbox environments for testing, rules for signing and deploying models, and monitoring of interaction phrases that indicate attempts to circumvent. Governance must include human approval for out-of-reach actions and immutable records of automated decisions; traceability is the only way to audit actions of self-employed actors.

The remediation work can be fractal: not everything is fixed at once. Start so you can produce more immediate risk reduction: privileged accounts, multi-environment tokens and code credentials. From there, implement continuous cycle of discovery, control and measurement. Measuring "dark matter" and its reduction in time offers the direction a specific risk improvement KPI.

Finally, the preparation is not only technical but cultural: development teams, operations and security should be formed in secure identity practices and in the particularities of the behaviour of IA agents. Software design decisions (avoid storage of secrets in repositories, use managed identities) and service level agreements with cloud suppliers are critical components. If you need a practical starting point, the guides and public frameworks mentioned above are good references and should be combined with a continuous internal evaluation.

Coverage

Related

More news on the same subject.