From Admin by Design to Breach by Default: An Offensive Kill Chain for Cloud & AI Machine Identities
From an attacker’s perspective, these non-human identities (NHIs) are ideal targets: long-lived credentials, excessive permissions, minimal monitoring, and behavior that blends perfectly into normal operations. Once compromised, they provide silent, scalable access with no malware, no exploits, and no social engineering.
This talk approaches NHIs from the offensive side first, modeling machine identity abuse as a cloud-native intrusion kill chain mapped to MITRE ATT&CK for Cloud and Containers. We walk through how attackers discover machine identities, steal credentials via metadata services, CI/CD pipelines, Kubernetes workloads, and AI agents, then escalate privileges by abusing trust relationships and automation rather than vulnerabilities.
Using live demonstrations built with open-source tooling (Wazuh, cloud APIs, Python automation), the session shows how compromised service accounts and AI agents are weaponized for persistence, data exfiltration, and cross-cloud movement... often without triggering traditional IAM or SOC alerts. Defensive controls are introduced only after the attack paths are fully demonstrated, positioning Identity Security Fabric (ISF) as a systemic response rather than a policy exercise.