Identity is the New Perimeter: Why Your IdP Isn’t Enough
文章探讨了身份识别在云安全中的核心作用,并指出尽管身份提供商(如Okta、Microsoft Entra ID和Google Cloud Identity)增强了认证和授权机制,但组织仍面临过度权限、休眠凭证和配置错误的信任策略等关键风险。Tenable Cloud Security通过持续发现、风险映射和实施最小权限原则等措施,帮助组织弥补这些安全漏洞。 2025-7-29 13:0:0 Author: www.tenable.com(查看原文) 阅读量:11 收藏

Tenable logo and report thumbnail with the words Inside the Tenable Cloud Security Risk Report 2025

In a cloud-first world, identity is one of the most critical layers of security. While organizations are making progress using IdPs, major identity protection gaps remain.

The rise of Identity Providers (IdPs) like Okta, Microsoft Entra ID and Google Cloud Identity has helped organizations centralize and strengthen human identity authentication. Strategic practices like multi-factor authentication (MFA), single sign-on (SSO) and policy enforcement are making IdPs a cornerstone of workforce access control.

According to the Tenable Cloud Security Risk Report 2025, 83% of organizations using Amazon Web Services (AWS) have configured at least one IdP — showing a move to greater maturity in identity practices. An IdP focuses on authentication and authorization – verifying identities and enforcing who can access what systems and under what conditions.

While the use of IdPs is a good step, organizations are still exposed to toxic identity risks that such tools don’t sufficiently cover. IdPs offer limited visibility into how identities behave within — and across — cloud environments, particularly when it comes to advanced identity threats like privilege escalation and lateral movement. Relying solely on an IdP creates critical blind spots. Here’s what you need to know — and how Tenable Cloud Security closes these identity security gaps.

The gaps your IdP doesn’t cover

1. Excessive permissions

The challenge: Developers often grant broad permissions to IAM roles or service accounts — such as s3:*, iam:*, ec2:*. These defaults are rarely audited or reduced later.

Why it’s dangerous: A compromise of one overly-permissioned identity can enable an attacker to gain excessive access — potentially escalating into full environmental takeover.

How Tenable Cloud Security can help:

  • Integrates cloud infrastructure entitlement management (CIEM) to map actual, effective permissions across your environment.
  • Automatically identifies over-permissioned and inactive identities
  • Recommends least-privilege policies based on real-world usage — not guesswork.
  • Enables Just in Time (JIT) access to reduce standing permissions to cloud resources and SaaS applications and improve auditability.
  • Based on real-world usage.

2. Dormant and stale credentials

The challenge: Service accounts and identity and access management (IAM) roles often persist long after their purpose ends. They remain active, unused — and unmonitored.

Why it’s dangerous: Attackers love dormant credentials. They’re rarely rotated, never expire and can silently unlock production environments.

How Tenable Cloud Security can help:

  • Continuously audits identity usage across Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure  and Oracle Cloud.
  • Flags and allows deactivation of unused identities based on 30, 60 or 90+ days of inactivity.
  • Provides real-time visibility for eliminating these silent attack paths before attackers find them.

3. Misconfigured trust policies

The challenge: IAM trust policies define who can assume what roles. But, too often, they're broadly written: "Allow any principal in this account."

Why it’s dangerous: These misconfigurations can enable privilege escalation, lateral movement or role hijacking — especially in cross-account scenarios.

How Tenable Cloud Security can help:

  • Parses IAM trust policies and flags overly permissive configurations.
  • Correlates identity trust with associated network exposure to show real attack paths, not just theoretical misconfigurations.
  • Helps your team lock down role assumptions before they’re exploited.

Securing the full identity fabric with Tenable Cloud Security

While IdPs play a vital role in access control, they only cover one part of your identity landscape. Tenable Cloud Security delivers deep, cloud-native identity security that complements — and goes far beyond — your IdP, including:

Continuous discovery and risk mapping:

  • Auto-discovers all human and non-human identities across your multicloud environments.
  • Maps effective permissions, trust relationships and access blast radius.
  • Unifies visibility across AWS, Azure, GCP and Oracle Cloud.

Prioritized risk context

  • Correlates infrastructure, identities, vulnerabilities, network, data and AI resources across multi-cloud and, with the Tenable One Exposure Management Platform, hybrid environments
  • Surfaces the highest-priority risks.
  • Doesn’t just show you what’s wrong — shows the context for why it matters and how to fix it fast.

Least privilege with CIEM – and JIT access

  • Enforces least privilege at scale with automated, CIEM-driven policy recommendations.
  • Make least privilege more granular with timebound, JIT access.
  • Integrates IAM hygiene into DevSecOps workflows to prevent permissions drift over time.

Why understanding identity security complexity in the cloud matters for CISOs

IdPs are necessary — but not sufficient. Attackers are chaining identity misconfigurations with network exposure and unpatched CVEs to move laterally within an organization. Your IdP may be helping guard against initial access but a serious security battle is being fought deep inside your cloud environment — between workloads, data pipelines and service identities.

With Tenable Cloud Security and Tenable One you can see and secure the full identity picture and tie it all into your broader cloud exposure management strategy.

➡️ Download the Tenable Cloud Security Risk Report 2025

➡️ View our on-demand research webinar

➡️ Read the previous blog in this series: The Toxic Cloud Trilogy: Why Your Workloads Are a Ticking Time Bomb

Don't stop at securing logins. Secure every identity. With Tenable Cloud Security, identity becomes your strongest control — not your weakest link.


Franklin Nguyen

Franklin Nguyen

Principal Product Marketing Manager

Franklin Nguyen is an experienced product professional specializing in cloud security and infrastructure solutions. Currently serving as Principal Product Marketing Manager, he leads product marketing efforts for Tenable Cloud Security (CNAPP). Prior to Tenable, Franklin had stints at Zscaler and VMware where he was brought in as a foundational product marketer to lead and drive growth for new products and services. His career in technology began as a product manager at IBM where he delivered v1 product releases for IBM Cloud virtual servers.

  • Cloud
  • Research Reports

Cybersecurity news you can use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Thank You

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Thank you

Thank you for your interest in Tenable.io. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose your subscription option:

Thank you

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

Request a demo of Tenable Security Center

Please fill out this form with your contact information.

A sales representative will contact you shortly to schedule a demo.

* Field is required

Request a demo of Tenable OT Security

Get the Operational Technology security you need.

Reduce the risk you don’t.

Request a demo

Don’t wait for an attack--eliminate risks before they’re exploited.

  • Uncover hidden weaknesses
  • Stop threats before they strike
  • Simplify security
  • Secure hybrid environments

Request a demo of Tenable Cloud Security


Exceptional unified cloud security awaits you!


We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.

See
Tenable One
in action

Exposure management for the modern attack surface.

See Tenable Attack Surface Management in action

Know the exposure of every asset on any platform.

Get a demo of Tenable Enclave Security

Please fill out the form with your contact information and a sales representative will contact you shortly to schedule a demo.

Thank You

Thank you for your interest in Tenable Enclave Security. A representative will be in touch soon.

Try Tenable Nessus Professional free

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
now available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Try Tenable Nessus Expert free

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.

Get a demo of Tenable Patch Management

Interested in streamlining security and IT collaboration and shortening the mean time to remediate with automation? Try Tenable Patch Management.


文章来源: https://www.tenable.com/blog/identity-is-the-new-perimeter-why-your-idp-isnt-enough
如有侵权请联系:admin#unsafe.sh