Dormant Accounts Leave Manufacturing Orgs Open to Attack
嗯,用户让我用中文总结一下这篇文章的内容,控制在一百个字以内。首先,我需要仔细阅读文章,理解其主要观点。文章主要讨论制造业在处理员工离职或角色变更时,对访问权限管理的不足。特别是提到48%的企业没有在24小时内撤销员工权限,这可能导致安全漏洞。 接下来,文章提到了身份治理的问题,包括自动化不足、权限过度分配以及过期凭证的风险。攻击者利用这些漏洞进行攻击,如凭证填充和钓鱼攻击。此外,文中还建议采取更安全的措施,比如最小权限原则、自动化管理和无密码认证。 现在我要把这些要点浓缩到100字以内。首先,制造业在处理离职员工访问权限方面存在不足。然后是身份治理问题导致的安全风险增加。最后是建议采用自动化和无密码认证来解决这些问题。 确保语言简洁明了,不使用复杂的术语。避免使用“这篇文章”或“文章内容总结”这样的开头词。直接描述内容即可。 最后检查字数是否符合要求,并确保所有关键点都被涵盖。 </think> 制造业在员工离职或角色变更后未能及时撤销访问权限,导致身份治理问题突出。48%的企业未在24小时内处理权限撤销,攻击者利用过期凭证和过度授权账户进行攻击。建议采用自动化管理、最小权限原则和无密码认证以提升安全性。 2026-3-19 08:25:16 Author: securityboulevard.com(查看原文) 阅读量:5 收藏

Workers who have been laid off or fired from their jobs often complain mightily that companies treat them like common criminals, with security escorting them out of the building in some sort of corporate perp walk. And then solicit one of their work buddies to pack up their personal stuff and ship it to them, as if they might walk out with the good silver.   

You would think that level of caution would apply to deprovisioning access, especially in manufacturing, where organizations onboard temporary workers, contractors and third-party system integrators at breakneck speed during Spring production ramp-ups. It seems at the very least incongruous that 48% of manufacturing organizations don’t revoke employee access within 24 hours after they depart or change roles, according to new research by Pathmark.  

“If those privileges are not revoked immediately when projects conclude, or permissions are granted too broadly, they create long-lived entry points and widespread access that adversaries can exploit,” says Darren Guccione, CEO and co-founder at Keeper Security. 

Perhaps the problems has intensified because a full 74% “lack fully automated user provisioning and de-provisioning,” the Pathmark report notes. 

What makes these dormant accounts particularly dangerous is that they don’t typically trigger behavioral alerts, which means they become an easy entry point for nefarious acts like credential stuffing, password spraying and phishing. Nearly half (46%) of security incidents that were reported were linked or thought to be linked to a yawning governance gap that has it genesis in, you guessed it, digital transformation.  

Stale credentials, Guccione says, “remain one of the most predictable and dangerous weaknesses in enterprise security.” Attackers understand that organizations are effectively leaving trusted identities active, he says, “and routinely look for dormant accounts that will allow them to blend in as legitimate users to avoid triggering traditional security alerts.” 

The findings “highlight a structural identity problem in manufacturing: Attackers increasingly log in rather than break in, and dormant or overprivileged accounts give them a frictionless path,” says James Maude, field CTO at BeyondTrust.  

“During seasonal rampups, access is created quickly but rarely removed with the same urgency, leaving behind a shadow layer of identities that don’t trigger behavioral alerts,” which Maude says, “expands the blast radius for everything from credential stuffing to insider misuse.” 

While just over half (53%) have some automation and rules in place to regularly conduct user access reviews, around one third (36%) are just getting started on identifying and remediating access risk and mostly depending on manual processes, as do 30%, who are at the same point when it comes to user account provisioning, modifying and de-provisioning. 

And it gets worse. About half (51%) do not use automated elevated access management with 14% admitting they have minimal or no governance when it comes to privileged access. They also note that those workers with the broadest permissions—third-party consultants and internal IT admins—are the most difficult to manage. 

Does make you wonder why three in five skipped comprehensive SoD risk simulations altogether before they deployed new roles as they migrated their organizations to the cloud. 

“With 74% of manufacturers lacking fully automated provisioning, 61% skipping SoD simulations before cloud migrations, and dormant accounts evading behavioral alerts entirely, the attack surface isn’t a gap—it’s a design flaw,” says Surya Kollimarla, director, identity security products at ColorTokens. 

Guccione says that “identity governance must be treated as a security priority, not just a compliance process” with access being “automated, time-bound and continuously verified, privileged access must follow the principle of least privilege and standing administrative rights should be eliminated wherever possible.” 

Security teams, Maude says, “should focus on shrinking standing privilege, ideally taking a just-in-time approach for privilege and access, especially for contractors and integrators.” 

By reducing privilege in a system, “you reduce the impact of inevitable mistakes,” he explains. 

Kollimarla urged security teams “to seriously evaluate two foundational shifts.” They must “go passwordless by design, not by patch.” Just layering passwordless capabilities on top of password-based infrastructure “don’t eliminate the attack surface—they obscure it,” he says.  

But “true passwordless architecture, integrated with automated SoD enforcement across your existing ERP and IAM systems, removes the credential risk at the source.” 

Security teams should also “authenticate based on context, not just identity,” Kollimarla says. 
Risk-based authentication that continuously evaluates the user, device, and application at the moment of access is the only model that raises the security bar without adding friction — because friction doesn’t get tolerated, it gets bypassed.” 

Perhaps then and only then will dormant accounts be perp walked out the door. 

Recent Articles By Author


文章来源: https://securityboulevard.com/2026/03/dormant-accounts-leave-manufacturing-orgs-open-to-attack/
如有侵权请联系:admin#unsafe.sh