Companies have built increasingly complex identity networks, but governance has not followed the same pace. As organizations and teams grow, identity is dispersed among thousands of applications, local accounts, automated services and IA agents acting on their own. The result is an invisible layer that many experts already call "dark matter of identity": activity and permits that exist outside the scope of central identity management systems and, therefore, outside the sight of security teams.
A recent analysis by Orchid Security notes that about half of business identity-related activity occurs where centralized controls do not monitor it. This statement - which can be consulted in the company's public work - reveals something basic: if we do not see where an access is granted or used, we cannot protect or audit it properly. This problem is not only technical, it is also organizational: disconnected tools, fragmented responsibilities and applications created by independent teams feed that invisibility.

Gartner has put the challenge in a broader context by proposing the idea of "Identity Visibility and Intelligence Platform" (IPP) within the framework of Identity Fabric. According to this view, an independent monitoring layer is needed that captures and understands identity signals above traditional access and governance systems. In other words, the solution cannot be limited to another identity repository; it must become an intelligence engine that uncovers, unifies and analyzes the actual activity of humans and machines. More information on the framework of Identity Fabric can be found in Gartner's resource: Gartner - Identity Fabric.
What would a platform with such characteristics mean? First, the ability to continuously discover the identities present throughout the technological landscape: from corporate directories to custom applications, legated and copied IA systems that operate with their own credentials. Secondly, that platform should serve as a consolidated identity data layer that unifies records, telemetrics and authorization flows to provide a single "account" of how access is being used. And third, it turns that data into actionable intelligence using advanced analytics and models that distinguish legitimate behavior from suspicious activity.
Several of the practical challenges appear when applications do not expose standard APIs or when their authentication logic is opaque. Some current technological proposals use dynamic instrumentation and binary analysis to inspect how the apps work internally without asking for code rewritings or long integrations. This approach allows you to discover local accounts, undocumented authentication routes and machine credentials that would otherwise remain hidden. When the true dimension of the application park is not known, it is not possible to measure or mitigate the risk it has.
The binding of telemetry specific to applications with localized systems log creates a layer of evidence that changes the way risk is assessed: instead of based on declared configurations, decisions are based on observed behavior. Reports analysing environments at the application level show worrying patterns: many applications keep accounts linked to old domains or even consumer posts, a high proportion has excessive privileges and a significant volume of accounts ends up orphaned over time. These findings serve to illustrate that real risk is often hidden behind incomplete governance assumptions.
The problem is complicated by the arrival of self-contained agents from IA. These digital actors can have independent identities and permissions and, if not integrated into government policies, become another source of "dark matter." Adapting the visibility and intelligence model to these agents requires clear rules of human attribution, complete activity records, contextual controls that assess access according to resource sensitivity and minimum privilege mechanisms that favour just- in- time access. All this must be accompanied by automatic remediation capabilities to shorten the exposure window.
From an operational point of view, adopting such a platform also transforms the way success is measured. Beyond counting licences or controls deployed, security officials must measure results: for example, the actual reduction of inactive permits or the average time to revoke critical access after an employee's departure. Formalizing protection agreements with the business - services with specific security objectives - helps to align priorities and translate technical controls into tangible benefits.

The practical recommendation for teams who want to close these gaps is not complex in idea, but demanding in implementation. It requires breaking silos between operations, application owners, IAM equipment and governance; prioritizing quantified risk analysis (with particular attention to machine identities); automating simple corrections that close position deviations as soon as they are detected; and using unified visibility as critical asset at high risk times, such as integration after an acquisition. In short, it is a question of converting continuous observability into a way to reduce the attack surface and accelerate audits and compliance.
The conclusion is clear: visibility will no longer be a luxury to become the essential control layer. Always keep the "main door" closed no longer if behind the building there are unchecked passageways and keys. Organizations that can see, understand and act on the dark matter of identity will have a huge advantage over the attackers; those that do not, will continue to face unexpected gaps that emerge precisely where controls do not look.
For those who want to deepen useful guides and reference frameworks in designing these capabilities, it is advisable to review reference documents on identity management and zero confidence such as NIST ( NIST SP 800-63), resources on zero-confidence models of CISA and analysis on the management of identities of suppliers specialized in machine identities such as Venafi. To understand the IPP proposal in the context of the Identity Fabric, Gartner's explanation can serve as a conceptual framework: Gartner - Identity Fabric. Finally, in order to follow the work and audits that identify "dark matter" within applications, the technical documentation and studies published by the companies that develop these solutions, for example in the resources of Orchid Security.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...