The Ultimate Guide to Non-Human Identities Report
NHI Forum

Notifications
Clear all

Sorting and minimizing NHI roles in Azure RBAC


(@labyrinthinesecurity)
New Member
Joined: 2 months ago
Posts: 1
Topic starter  

Meet "The Monster". A ๐ฏ๐ž๐ซ๐ฒ ๐๐š๐ง๐ ๐ž๐ซ๐จ๐ฎ๐ฌ Non Human Identity (NHI).
We discovered The Monster in Azureย when we implemented our NHI ultrametric scanner (github repo: https://github.com/labyrinthinesecurity/silhouette ).

Ultrametrics unraveled its spectral band: I of XXII, singling it out in the top 10% of the most powerful identities acting in one Azure Tenant (green stickers 2 an 3 in picture The Monster).

The band alone is not enough to determine data risk, though: we executed an additional, high resolution contour analysis of the NHI dendrogram with data perimeter calculation (green sticker 1). The large perimeter promoted the monster to the top 1% of most powerful NHIs.

Finally, we confirmed the maximum critical residual risk when we looked at the Monster's identity type in Entra ID: not a Managed Identity... Not an Application... Microsoft's brand new ๐€๐ ๐ž๐ง๐ญ ๐ˆ๐ƒ ๐ข๐๐ž๐ง๐ญ๐ข๐ญ๐ฒ!

So, the "Monster" turned out to be an Agentic AI polymath with life-and-death access to a large part of our production data banks.

๐˜‹๐˜ฐ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ช๐˜ด ๐˜ด๐˜ต๐˜ฐ๐˜ณ๐˜บ ๐˜ด๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅ ๐˜ญ๐˜ช๐˜ฌ๐˜ฆ ๐˜ด๐˜ค๐˜ช-๐˜ง๐˜ช? ๐˜๐˜ต'๐˜ด ๐˜ฏ๐˜ฐ๐˜ต. ๐˜ž๐˜ฆ๐˜ญ๐˜ญ, ๐˜ข๐˜ญ๐˜ฎ๐˜ฐ๐˜ด๐˜ต...
๐˜ ๐˜ฎ๐˜ข๐˜ฅ๐˜ฆ ๐˜ช๐˜ต ๐˜ถ๐˜ฑ ๐˜ต๐˜ฐ ๐˜จ๐˜ช๐˜ท๐˜ฆ ๐˜บ๐˜ฐ๐˜ถ ๐˜ข ๐˜ง๐˜ฆ๐˜ฆ๐˜ญ ๐˜ฐ๐˜ง ๐˜ฐ๐˜ถ๐˜ณ ๐˜ด๐˜ฉ๐˜ฐ๐˜ณ๐˜ต-๐˜ต๐˜ฆ๐˜ณ๐˜ฎ ๐˜ง๐˜ถ๐˜ต๐˜ถ๐˜ณ๐˜ฆ:
✅ ๐˜ˆ๐˜จ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ค ๐˜ˆ๐˜ ๐˜ข๐˜ณ๐˜ฆ ๐˜ข๐˜ญ๐˜ณ๐˜ฆ๐˜ข๐˜ฅ๐˜บ ๐˜ฅ๐˜ฆ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ฆ๐˜ฅ ๐˜ช๐˜ฏ ๐˜ฎ๐˜ข๐˜ฏ๐˜บ ๐˜›๐˜ฆ๐˜ฏ๐˜ข๐˜ฏ๐˜ต๐˜ด, ๐˜ฑ๐˜ฆ๐˜ณ๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜ฉ๐˜ถ๐˜ฎ๐˜ข๐˜ฏ-๐˜ญ๐˜ช๐˜ฌ๐˜ฆ ๐˜ด๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ด.
✅ ๐˜Œ๐˜ฏ๐˜ต๐˜ณ๐˜ข ๐˜๐˜‹ ๐˜ข๐˜ญ๐˜ณ๐˜ฆ๐˜ข๐˜ฅ๐˜บ ๐˜ค๐˜ญ๐˜ข๐˜ด๐˜ด๐˜ช๐˜ง๐˜ช๐˜ฆ๐˜ด ๐˜ˆ๐˜ ๐˜ข๐˜จ๐˜ฆ๐˜ฏ๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข ๐˜ฅ๐˜ฆ๐˜ฅ๐˜ช๐˜ค๐˜ข๐˜ต๐˜ฆ๐˜ฅ ๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ต๐˜บ, ๐˜ฅ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ฏ๐˜ค๐˜ต ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ฐ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜ฃ๐˜ฐ๐˜ต๐˜ด.
✅ ๐˜š๐˜ช๐˜ญ๐˜ฉ๐˜ฐ๐˜ถ๐˜ฆ๐˜ต๐˜ต๐˜ฆ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ฆ๐˜ด ๐˜ฃ๐˜ฐ๐˜ต๐˜ฉ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ถ๐˜ญ๐˜ต๐˜ณ๐˜ข๐˜ฎ๐˜ฆ๐˜ต๐˜ณ๐˜ช๐˜ค ๐˜ด๐˜ค๐˜ข๐˜ฏ๐˜ฏ๐˜ฆ๐˜ณ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฅ๐˜ข๐˜ต๐˜ข ๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฎ๐˜ฆ๐˜ต๐˜ฆ๐˜ณ ๐˜ณ๐˜ถ๐˜ญ๐˜ฆ๐˜ณ, ๐˜ง๐˜ฐ๐˜ณ ๐˜ข๐˜ญ๐˜ญ ๐˜ˆ๐˜ป๐˜ถ๐˜ณ๐˜ฆ ๐˜•๐˜๐˜๐˜ด.

In the cloud, Smart NHI AIs are here, their identities are here, "Monster" detection tools are here.

❓ Is your SOC here? Get prepared!

ย 

ย 


   
Mr NHI reacted
Quote
Share: