l-Xatar l-Sakat: Kifach t-Hiyed "l-Huwiyat l-Chabah" (Ghost Identities) Qbeil may-Fdh'u l-Data dyal l-Charika dyalk
[Webinar] Eliminate Ghost Identities Before They Expose Your Enterprise Data
l-Xatar l-Sakat: Kifach t-Hiyed "l-Huwiyat l-Chabah" (Ghost Identities) Qbeil may-Fdh'u l-Data dyal l-Charika dyalk
l-Khulasa (TL;DR)
f-2024، 68% dyal l-khariqat l-khasiya f-l-cloud kan l-sabab dyalha hwa "service accounts" m-pikiya w-swaret API (API keys) mnsiyyin — hadchi feyyet l-phishing w-l-kudat d-lhima l-dfifa. Had l-"Huwiyat l-Chabah" (Ghost Identities) k-itjawzo l-mowaddafin l-bachariyyin b-nisba dyal 45 l-wahed, w-ghaliban k-ikonu andhum salahiyat kbiira bzaf. T'allem kifach t-ammen l-mohit dyal l-huwiyat l-ghayr bachariya (NHI) dyalk qbeil may-stayllu l-hackers had l-biban l-khlfiya l-mamsura fihom l-ain.
l-Wajha l-Jdida dyal l-Khariqat f-l-Cloud
L-snin hadi, t-tadrubat dyal l-amn l-sibernitiki kant m-rkza ala "l-onsor l-bachari" — k-thaydar l-mowaddafin mn l-imaylat d-l-phishing w-k-t-fard alihem kudat srar s'abiin. Walakin, l-mouatiiyat l-khira k-tbin belli l-khatar l-haqiqi kayen f-plassa khra.
f-2024, 68% dyal l-khariqat l-cloudية kant l-sabab dyalha hwa "service accounts" mkhrtuqa w-swaret API mnsiyyin. Hadchi machi ghalat bachari b-l-ma'na l-taqlidi; hadu fachal f-t-tasyir dyal l-Huwiyat l-Ghayr Bachariya (NHIs). F-l-waqt li l-firaq d-l-amn k-t-rkkaz ala d-dukhul dyal l-moustakhdimin, l-hackers k-it-khayru triq l-sahla: k-ihazzu l-"swaret" li m-mlohyin l-bara b-aynan s-shams.
Tawrat l-Alat: 45 l-wahed
l-hajm dyal l-mochkil dyal l-huwiyat l-ghayr bachariya rah khayali. F-charika asriya adiya, مقابل kul mowaddaf bachari wahed, kaynin bin 40 hta l-50 huwiya d-l-atmeta (automated credentials). Hadchi k-ichmal:
- Service accounts
- API tokens
- l-Irtibatat dyal l-A'amil d-l-IA (AI agents)
- Salahiyat l-OAuth
M'a t-takat-ur dyal l-a'amil d-IA w-l-workflow-at l-automatikiya, had l-huwiyat k-it-khlaqu b-wahed l-sor'a li l-moraqaba l-yadawiya d-l-amn ma-qadrach t-sayrha.
Chnu huma l-"Huwiyat l-Chabah"?
l-Huwiya l-Chabah (Ghost Identity) hya wahed l-huwiya d-l-atmeta li k-tbqa khddama hta mn b'ad ma k-tsali l-mouhimma dyalha. Mllli k-isali chi projé khass awla k-imchi chi developpeur mn l-charika, l-access d-l-bnadem k-it-ql'a, walakin dok l-service accounts w-l-API tokens li t-saybu f-dik l-modda ghaliban k-ibqaw khddamin, b-kamal l-salahiyat dyalhum, w-hta wahed ma-da-ih fihom l-bal.
Had l-"asbah" khatira b-khousous hit:
- Salahiyat Zayda: Bzaf mnhom andhum access d-l-Admin w-huma aslan ma-m-htajinhch.
- Taharruk l-Ufuqi (Lateral Movement): Token wahed m-piki y-qdar i-khalli l-hacker i-tsarra ya-t-sara f-l-bi'a d-l-cloud kamla.
- Waqt l-Baqā' l-Twil: Hit l-adawat dyal l-IAM (Identity and Access Management) l-taqlidiya k-t-rkkaz ala l-bachar machi l-alat, had l-ikhtiraqat ghaliban ma-k-it-fāquch biha. l-moiddal d-l-waqt li k-ibqa fih l-hacker daxel blama i-ch'ur bih hed l-an rah feyyet 200 yum.
l-Ach l-IAM l-Taqlidi ma-kafi-ch
l-hallul d-l-IAM l-taqlidiya t-bnat b-tasmim "bachari". Hya mzyana f-t-tasyir dyal l-mowaddafin — mn nhar k-idkhlu l-khdma hta l-nhar k-ikhurju. Walakin, k-tlqa s'uba bach t-chuf chnu waq'a f-l-tabaqa d-l-alat (machine layer). Ma-k-t-sawaqch l-swaret l-mkhbbiyyin (secret keys) f-l-code, awla l-tokens li k-t-khddam f-l-back-end, awla l-irtibatat li k-t-jma' bin l-platformat d-SaaS l-mou-khtalifa.
Kifach t-bni Playbook l-Amn dyal l-Huwiyat l-Ghayr Bachariya
Bach t-wa-jeh had l-khatar li k-izad, firaq l-amn khasshum i-fut-u l-moraqaba l-yadawiya w-i-t-bb'u itar l-khidma m-nddam l-t-ndif l-huwiyat. Bach t'alaj hadchi, wahed l-webinar jayi i-qlldem likom "playbook" dyal l-khdma bach t-ammnu l-bi'a dyalkom, m-rkza ala:
- l-Iktichaf (Discovery): Dir scan kamal bach t-u-rf kul huwiya ghayr bachariya f-l-bi'a dyalk.
- Taqshis l-Salahiyat (Permission Right-Sizing): t-tabbuq itar l-khidma bach t-dkkad belli l-service accounts w-l-IA andhom ghir l-salahiyat li m-htajin b-d-dabt l-mouham dyalhum.
- Siyasat l-Aatmeta d-Dawrat l-Hiyat: Dir qawa'id bach l-huwiyat "l-miyta" awla li ma-khddamach t-tla-gh automatikiya qbeil may-lqāwha l-hackers.
l-Khulasat
l-Intiqal l-sri' l-l-atmeta d-l-khdma w-t-ndif l-IA khlaq wahed l-mohit d-l-khayal (shadow perimeter) kbiir w-ma-m-say-yarch. m'a l-istimrar dyal l-huwiyat l-chabah f-t-tjawuz d-l-a'dad d-l-bachar, khass l-amn dyal l-charikat i-thawwal bach i-chmul l-tabaqa d-l-alat. Bla stratijiya istibaqiya bach t-lqa w-t-hhi-yed had l-swaret l-mkhbbiyyin، ghadi i-bqa dima andek bab l-khlfi m-hluul l-l-hackers.
M'alumat ala l-Ivent
Ila knti m-sta'idd bach t-ammen l-huwiyat l-ghayr bachariya dyalk، charek f-l-jalsa l-mouchira l-jaya bach t-akhod "Identity Cleanup Checklist" w-t-chuf kifach d-dir had l-istratijiyat d-l-amn d-qa b-d-qa.
l-Masdar: Eliminate Ghost Identities Before They Expose Your Enterprise Data