Learning Library

← Back to Library

Integrating Human and Machine Identities

Key Points

  • Bob Kalka (IBM) and Tyler Lynch (HashiCorp/IBM) introduce a new “cyber‑trust” series that shifts the typical split‑track conversation on human versus machine identities toward a unified approach.
  • They note that ≈ 80 % of cyber‑attacks now exploit identity, highlighting how siloed teams and tools (e.g., separate IT and DevOps solutions, limited SIEM analytics) leave organizations vulnerable.
  • The concept of an **identity fabric** is presented as a pragmatic alternative to vendor‑centric “replace everything” pitches: it layers AI‑enhanced capabilities onto existing technologies to create a cohesive, interoperable identity ecosystem.
  • For human identities, they differentiate **workforce IAM (WIAM)** and **consumer/ citizen IAM (CIAM)** and observe that most clients can only name a product, lacking a broader strategic framework.
  • The discussion stresses the need to manage both human and non‑human (machine/service‑principal) identities together, leveraging a fabric approach to close gaps and improve overall cyber‑trust.

Sections

Full Transcript

# Integrating Human and Machine Identities **Source:** [https://www.youtube.com/watch?v=fSLEm4Nz0Vo](https://www.youtube.com/watch?v=fSLEm4Nz0Vo) **Duration:** 00:17:05 ## Summary - Bob Kalka (IBM) and Tyler Lynch (HashiCorp/IBM) introduce a new “cyber‑trust” series that shifts the typical split‑track conversation on human versus machine identities toward a unified approach. - They note that ≈ 80 % of cyber‑attacks now exploit identity, highlighting how siloed teams and tools (e.g., separate IT and DevOps solutions, limited SIEM analytics) leave organizations vulnerable. - The concept of an **identity fabric** is presented as a pragmatic alternative to vendor‑centric “replace everything” pitches: it layers AI‑enhanced capabilities onto existing technologies to create a cohesive, interoperable identity ecosystem. - For human identities, they differentiate **workforce IAM (WIAM)** and **consumer/ citizen IAM (CIAM)** and observe that most clients can only name a product, lacking a broader strategic framework. - The discussion stresses the need to manage both human and non‑human (machine/service‑principal) identities together, leveraging a fabric approach to close gaps and improve overall cyber‑trust. ## Sections - [00:00:00](https://www.youtube.com/watch?v=fSLEm4Nz0Vo&t=0s) **Bridging Human and Machine Identity** - Bob Kalka and Tyler Lynch introduce a new series on cyber‑trust, highlighting how siloed human and machine identity management leaves organizations vulnerable and offering integrated IAM patterns and practices to address the majority of identity‑related cyber attacks. - [00:03:19](https://www.youtube.com/watch?v=fSLEm4Nz0Vo&t=199s) **Legacy Identity Chaos in Hybrid Cloud** - The speaker outlines how enterprises cling to decades‑old, homegrown identity systems and legacy applications that lack modern authentication, resulting in a tangled, insecure environment amplified by hybrid multicloud complexities. - [00:06:21](https://www.youtube.com/watch?v=fSLEm4Nz0Vo&t=381s) **Managing Identity Mess with Observability** - The speaker describes how scattered human and machine identity stores and hard‑coded secrets create a security nightmare, and introduces the top six client‑driven use cases, beginning with “identity observability” (aka identity security posture management) to uncover sloppy implementations like hidden directories and exposed credentials. - [00:09:31](https://www.youtube.com/watch?v=fSLEm4Nz0Vo&t=571s) **Dynamic Secrets for Non‑Human Identities** - The speaker explains how centralizing secret storage and shifting from long‑lived static credentials to just‑in‑time, dynamically generated secrets improves auditability, revocation, and security for API keys, database passwords, and cloud credentials. - [00:12:34](https://www.youtube.com/watch?v=fSLEm4Nz0Vo&t=754s) **Identity Threat Detection and Response Challenges** - The speaker highlights the struggle of fully deploying PAM, emphasizes the need for real‑time identity observability to uncover shadow assets and policy bypasses (MFA, ZTNA, VPN, secrets), and defines ITDR as moving threat detection and response directly onto identity engines. - [00:15:45](https://www.youtube.com/watch?v=fSLEm4Nz0Vo&t=945s) **Accelerating Detection of Credential Abuse** - The speaker explains that compromised, valid credentials normally take 292 days to identify, but real‑time behavioral analytics can flag misuse within seconds, emphasizing the need for comprehensive governance of both human and machine identities throughout their lifecycle. ## Full Transcript
0:00Hi, I'm Bob Kalka, Global Identity Lead for IBM. 0:03And I'm Tyler Lynch. I'm the field CTO for HashiCorp, now part of IBM. 0:07And today we're kicking off a multipart series on cyber trust. 0:10But we're focusing on identity and access management. 0:12But we're looking at this from a perspective 0:15that's different than the typical discussion 0:17we have with clients today, because in most shops we walk into, 0:20we have a separate discussion with IT 0:22about human identities and a separate discussion with DevOps 0:25or platform engineering on non-human and machine identities. 0:29And the dis ... disconnect between the two in most shops 0:33is evidenced by the fact that 80% of all cyberattacks today 0:38involve identity somehow. 0:40So it is clear that the way organizations 0:42are doing this today—with disconnected teams and tools—uh ... 0:46such as trying to turn on a user-behavior analytics 0:48in the security information event management tool, 0:51and the SOC, uh ... that just everybody does it, but it doesn't find much, 0:55it's clear that we're not being enough 0:57in managing human or machine identities, let alone doing it together. 1:01Yeah. And so hackers aren't just hacking in anymore—they're 1:04logging in. 1:05And today we want to talk about patterns and practices for identity 1:08and access management that you can apply today using the tools you have. 1:11Since we joined IBM ... You know, we have focused on non-human identity traditionally. 1:15As we've joined IBM, we've listened to feedback 1:17from our customers and we've worked with them. 1:19What we're finding is that the IT teams 1:21typically own human identity, 1:24and that can be defined as workforce identity and access management—WIAM, 1:27and consumer identity and access management—CIAM. 1:30But then the platform or DevOps teams own non-human identities, 1:34which is essentially a principle 1:37for your applications to run under. Exactly. 1:40So we're going to talk about how do you address 1:43managing both human and non-human identities. 1:47And we're going to talk about it relative to a concept of an identity fabric. 1:54What identity fabric means 1:56is that a lot of vendors will go in and say, "Look, 1:58the answer is throw out all that stuff you have and use my stuff." Right? 2:02And that's not pragmatic at all, 2:04especially with what we're going to show you here. So, 2:06what the identity fabric concept is, is 2:09take the technologies that you have, 2:12augment it with some 2:13AI-based capability, etc. 2:15so it literally forms a fabric that works together better. 2:19All right? So let's start with the human identity side. Whenever 2:22we go into a client to talk about human identities—typically 2:24to ITOps or and/or the CSO office—you 2:28end up talking about the two basic types of identities. 2:31You have your workforce users, 2:34which of course, are your internal users. 2:36And then you have your consumers, 2:39or in public sector, the citizens, right? 2:42And that's all your external users. 2:44And when we go into a client and we say, "Alright, 2:47okay, what's your strategy for handling that?", 2:50almost 99% of the time 2:52what we get as an answer is the name of a tool, 2:55some identity provider—Okta, IBM, 2:58Ping, ForgeRock, Microsoft, whatever. 3:01And they'll say, "Well, uh ... we're based on ... uh ... moving to this new cloud-based tool 3:07and we've got kind of a directory of users as well—typically, 3:10Active Directory or something like that—and 3:12that's what we're doing." 3:14And we'll say, "The question was 'What's your strategy?'" 3:18And that's the name of a tool. 3:19And the response is typically, "Well, 3:21you know, we kind of looked at everything out there 3:23and we think this is the right one for us." 3:25And then I'll say, "Well, what about all the other IDPs 3:28you have, such as you probably have at least one, 3:31if not more, for your workforce users?" 3:34If we're being honest, what we typically see 3:37is a 20- to 25-year-old 3:39homegrown identity management system 3:42that the organization has been trying to get rid of for 15 to 20 years 3:45that's still there—some on-prem system and in some new cloud-based system. Now, 3:49that alone is an issue, of course, 3:51but then we get to the next level of the problem, 3:54which is you find there are a ton of legacy applications out there. 4:00And how do legacy applications—where 4:02oftentimes the guy or gal that wrote them 4:04isn't even with the company anymore. 4:06They typically don't support multifactor authentication, 4:09let alone passwordless technologies. 4:11How do they do identity management today? 4:13Well, they typically have either a side 4:16file baked into the application 4:18of user IDs and passwords, or they ... they're using a SQL table. Yeah. 4:22Could be SQL table usernames and passwords. 4:24If we're lucky, they might even be hashed passwords. 4:27They could be local password accounts. 4:29It could be any number of ways that we provided 4:31authentication and authorization traditionally over 4:33the last ten, 20, 30, 40 years. Exactly. See, 4:36this is a mess. But we haven't gotten to the best part yet, 4:38because then you got to add in your hybrid multicloud investments, 4:42where you're managing identities in those as well. 4:45But it's not just identities in those. 4:47You're managing your workforce identities in those, so your folks can access those clouds 4:51and take elevated privileged actions on those control planes. 4:54And oftentimes, they're also managing your consumer identities 4:57using native directories and tools inside those clouds. 5:00So now this problem becomes even bigger 5:02Even bigger, because all of this is just for the human identities. 5:06We haven't even gotten to the much larger set of identities out 5:09the non-human identities. 5:11What is a non-human identity? Let's break that down a little bit. 5:13We see non-human identities in four major categories. 5:16First is machine identity. 5:17This is the identity of the application or workflow that's operating. 5:21We will then see identities around API keys and API access. 5:25And there's a number of different ways to do this, but 5:26let's just classify them as APIs. 5:29We then have PKI, so 5:31public key infrastructure. 5:33This could be x509 in other ways. 5:35And then we have AI and 5:37AI agents. 5:39Now, recently we did some analysis, and 5:4280% of the Fortune 500 cited AI in their earnings report. 5:46We know that this is a growing and evolving space. 5:49We've been doing this for decades, but really, it's become in vogue. 5:52And with AI, we're starting to see proliferation. 5:54Not only do you have the identity for the AI agent, that's oftentimes elevated, 5:58you have the identity of the person using that agent 6:01the agent must act on behalf of. Exactly. So, 6:04think about this picture, right? 6:06If you pull in both the human and non-human identities, we have ... 6:10Let's say you're doing zero trust focus in the organization. 6:13You're going to have a policy that says least privileged access, who 6:16has access to what. 6:18Where do you actually enforce that policy? 6:20Guess what? 6:21Let's ... Go ahead. 6:23We are managing it in all these different places. 6:29And there's most likely a IDP of some sort 6:32and a directory over here as well. 6:35Any number of things can be used to support these. 6:38So you see why this is such a mess: 6:40is that both within human and non-human identities, 6:44where oftentimes you're having secrets hardcoded into applications, 6:48it just leaves itself to a lot of places 6:51where the water can trickle through of a cyberattack. Right? So, 6:54what we and HashiCorp have found 6:56is that there's a couple of dozen different use cases of things 6:59people would like to be able to do better and able to do, 7:02but there are six that really stick out to us at every conversation 7:06we're having with a client ends up on these topics. 7:09So what we want to share with you are what are the top six 7:13use cases that people would like to be able to do that 7:16this mess is making next to impossible for them. Right? 7:19So, the first use case 7:22is what we'd call identity observability. 7:26Now what is that now? 7:28Cool kids might call this thing 7:30identity security posture management or ISPN. 7:34What this means is 'Can you find the sloppy implementations of human and non-human identities 7:42that could lead to an attack being more effective?' 7:44For example, can you find the secrets 7:47hardcoded into applications? 7:49Can you find a shadow directory 7:52that some departments set up five years ago 7:54that was supposed to be gone four years ago, 7:56and now you have 3000 people using it, 7:58and It has no idea that it's even out there? 8:00Can you find the shadow assets, the shadow identities? 8:03Can you find that stuff? Now, that's just within, say, 8:07non-human identities and human identities. 8:10The even bigger piece of identity observability 8:13is being able to watch how the non-human 8:15and human identities are interacting, 8:17which nobody's been able to do until recently. 8:20I'll give you a good example we're seeing all over the place. Um, 8:22you'll have a non-human, uh, 8:25machine ID on a server 8:27getting access to backend systems, 8:29and all of a sudden 20 human users start regularly, often using 8:33that same non-human service account. 8:36And of those 20 human identities, 8:38eight of them were inactive for the previous year and a half. 8:41That is clearly a potential problem. 8:44But nobody's had that level of obs ... observability, 8:47not just human and non-human, but how they're interacting. 8:50So that's the first use case. 8:52The second one 8:54is frictionless access. 8:55When we say frictionless access, we're removing the username 8:58and password from the logged-in experience 9:01and really making the user experience easy and seamless. 9:04This can be with passkeys and other ways that we can do this, 9:06but frictionless access to somebody—something that we're talking about a lot. 9:09Yeah, because it ... it radically improves 9:12the user's experience with your online systems. 9:15At the same time, it radically increases the security of it. 9:18So that's why people want to go there 9:20and think about our discussion on legacy apps. 9:22They don't even support MFA. How are they going to possibly ever get there? So, 9:25people want to move there, but they're held back by the physical reality 9:29of how the identities are handled. 9:31Now, these two ... um ... are kind of like obvious ones, 9:36but the next two are really focused on the non-human identities 9:40because it is a huge issue. 9:42And so what we talked about a lot is centralized secrets management. 9:46And this is centralizing where you're going to store secrets for non-human identities. 9:51This could be API keys, database credentials, root cloud credentials and the like. 9:55So having a central control plane to store them 9:58and to revoke them, but also to audit against 10:01so we know who's accessing them, using them and how often. 10:04And that's really where people start. 10:06They start with centralizing their secrets, but they're oftentimes static secrets. 10:10Raise your hand if you've ever had a database credential that you didn't change. 10:13They're oftentimes very long-lived. 10:15So what we want to do is encourage our customers where it makes sense to move to 10:18dynamic credentials. 10:20And dynamic credentials 10:22are just-in-time created credentials when needed. 10:24Application A needs to talk to application B 10:27or web service B, and we can create them dynamically. 10:29We can also bind them 10:31so it's only that caller and that target that can be using them. 10:35This becomes really interesting because if you have static secrets and somebody makes an oopsie 10:39and accidentally commits code to GitHub, 10:41we know with empirical evidence that people are scanning GitHub commits. 10:44And as soon as the credential hits GitHub, 10:46they're already being used in exercise to try to gain access. 10:49It is almost instantaneous. 10:51Dynamic secrets removes this risk from us. 10:53So when we can move there, we want to move there. 10:56But before dynamic secrets, we often get to just rotated secrets. 10:59If you have static secrets, rotating them regularly—that 11:02could be every week, every 30 days, every 60 days—get rotation. 11:06Rotation also provides stability for immediate revocation. 11:09So if a secret was to get leaked or compromised 11:11for some reason, you already have mechanisms in place that are fairly easy 11:15to operate, to rotate that secret and to reduce that risk. 11:18So think about the gulf between where most shops are today 11:22versus where Tyler just articulated 11:24you can get to. You go from hardcoding secrets 11:27into app to having an auditable static secret 11:31all the way to dynamic secrets. Right? 11:34And so you wonder why these are amongst the top use cases. 11:37So let's close out the top use cases with the final two, 11:40and you're all going to groan when I share this next one, right? 11:43Because the next one is privileged access management. 11:47I still remember when Sarbanes-Oxley came out in 2003, 11:50and the first government bulletin was 'Thou shalt do PAM', right? 11:54The most privileged users, you want to make sure, both human and non-human, 11:57you want to make sure you spend extra careful attention to them. 12:01And yet, the typical shop today is only rolled out 12:04PAM controls to 20 to 70% of their privileged users, 12:08leaving 30 to 80% unprotected. 12:11Not only have auditors jumping all over this, 12:14but the whole cyber insurance industry is being obsessed with this 12:17because we know firsthand they're going into chief 12:20information security officers, for example, and saying, 12:23um, "Prove to us 12:25you know where all your privileged users are 12:28and that you've got proper PAN controls, or we're not going to renew your policy 12:31or we're going to up the rate like this" or something like that. 12:34Nobody wants to be responsible for that business problem, right? So, 12:37PAM and getting it rolled out 12:39to 100% has become a huge issue. 12:42And then the final use case, 12:44which is coming up in every conversation, 12:46kind of takes the first one around identity observability 12:49to find the shadow assets in the weak spots. 12:53And it's what do you do in real time to protect the system. 12:56And that's actually what a lot of people 12:58would call identity threat detection and response, 13:02or ITDR. That 13:04is the ability to find 13:07when a SOC is struggling 13:11to find identity attacks. 13:13How do we move the threat detection response 13:15closer to the identity engines themselves? 13:18That's what ITDR really is. 13:20And it's being able to find 13:22like the policy bypasses. 13:24So one of the most common problems we're seeing today: 13:26you'll have a user authenticating against a directory—hopefully 13:29not one of those one shadow ones that you didn't know were there—and 13:32it's accessing an app that according to the policy must go through MFA. 13:36And yet, if you look at the network traffic or the cloud traffic, 13:40they authenticated, they accessed the app, 13:43but there was no activity against the MFA engine you've got to bypass. 13:46Are you able to see that? It is so common, it's 13:49unbelievable right now. 13:51So MFA bypass, 13:53ZTNA bypass, VPN bypass, even secrets management bypass. 13:58Can you find those bypasses? 14:00That's what ITDR is. 14:01So those are the six use cases. 14:04And I would ... I'm assuming you probably agree with us, 14:06we're seeing this everywhere—if people want to be able to get here, but 14:09they're struggling with how to do it. 14:11So ... let's talk about how you get started. Yeah. 14:13So in phase one we do inspect. 14:16Inspect is the 'how do we find secrets', and 14:19so secret identification and secret discovery. Where are they living? So, 14:22we find secrets in all places—configuration, code, 14:26confluence pages, Jira, wikis, ServiceNow tickets—we 14:32find them everywhere. So being able to inspect 14:34and do secrets discovery, to understand 14:36what is the inventory of secrets 14:37that are out there and how big is this problem for us. 14:40Yeah. As a ...as a CSO told me once, 14:42if you can't see it, you can't secure it, right? 14:45And so finding the secrets 14:47and then doing identity security posture measure of finding the shadow 14:50identities, shadow directory, shadow assets etc. is huge, right? 14:54Then what comes next— 14:55protect. 14:57So, protection is, 14:59well, how do I protect these secrets that I know exist. 15:01The first one is going to be centralized secrets management. 15:04Exactly. 15:06Second is going to be PAM, privileged access management. 15:09Third ITDR and behavioral analysis. 15:13So, let's talk about those final two for a minute 15:16because ITDR once again ... ITDR is 15:18gotten to be a hot phrase for the last two years, so 15:21it's starting to lose its meaning because everybody says, 15:23oh yeah, that's what I happen to do, right? 15:25We're going to be very specific about what we mean by ITDR, 15:29and that is finding those policy bypasses 15:32as well as the attacks on the identity system itself. 15:36Behavioral analysis is very interesting 15:38because the number one identity attack right now 15:41is leveraging a compromised, valid credential. 15:45And when you leverage a compromised, valid credential, a 15:48study came out from our cost of data breach study last year, 15:52that it takes 292 days, on average, 15:54to identify and contain an attack that originated 15:57with leveraging a compromised, valid credential. 16:00So doing behavioral analysis of things 16:02like looking at typing rate of the user when they authenticate, 16:06is when that leveraged compromised credential is happening, you 16:08can watch it as it's happening. 16:10You can find in the first 10 seconds as opposed 16:13to waiting 292 days to actually go do that stuff. 16:17That leads us then to the final step of the process, which is governing. 16:21And so we can think about governing is ... governing 16:23the lifecycle of our secrets and of our identities. 16:26And so these machine identities, there's these human identities ... 16:29really considering the full lifecycle and all the workflows that are involved—employee 16:33onboarding, employee offboarding, 16:36principal onboarding, principal offboarding, revocation, denial. 16:40It is a full lifecycle, 16:42and we need to treat it as such and treat them 16:44as consistent workflows for human and non-human identity 16:47So governance brings the consistency, 16:49protection brings the little protect, and inspect 16:52helps us find those hidden things that we couldn't see. 16:56That's what we're going to talk about in this series around 16:58managing human and non-human identities through an identity fabric. 17:02So thank you for your time. Thanks for joining