The overlooked identities – machines and workloads matter too

An abstract image of a lock against a digital background, denoting cybersecurity.
(Image Credit: TheDigitalArtist / Pixabay) (Image credit: Pixabay)

Most people understand “digital identity” as all the online information linked to humans, such as usernames and passwords, that allow us to access services and apps. Today – with our lives increasingly playing out online – this identity is crucial for almost every action we take, from online security to seamless transactions.

However, a critical aspect of digital identity that’s often overlooked within organizations is the identity of machines. Machines, from IoT devices to servers, and even the workloads that run on them – like containers, microservices, or bash scripts – all require identities. These identities can be hacked and exploited just like human ones, revealing critical information and posing significant risks if not managed consistently across environments.

Matt Barker

VP & Global Head of Workload Identity Architecture, Venafi.

Maintaining identity consistency

As multi-cloud environments and cloud-native architectures have become standard, the number of machine and workload identities is soaring. In 2023, workload identities alone outnumbered human identities 10 to 1, and this gap is expected to widen, set to reach 100 to 1 soon. Understanding and managing these identities is vital for maintaining organizational security in the digital age – but how do businesses ensure consistency across their identities?

With the rise in cloud adoption, workloads are increasing exponentially, turning identity into a business-wide issue. Everything operating within your business, from a simple script to a complex workload, requires the same security considerations as a human identity. It's not enough for workloads to just have an identity; they need one that is consistent, secure, short-lived, and thoroughly vetted. Much like people who often face challenges managing multiple logins, locations, and passwords – leading to frustration, risk, and productivity slowdowns – workloads can encounter similar issues. Maintaining consistent identities for these workloads is essential to safeguarding them against threats.

Building the workload identity pyramid

Consider workload identities as a pyramid. First, at the foundation we have workload identities and managing their entire lifecycle. Moving up, the next level is authentication, ensuring each entity is correctly identified and verified. The next level is authorization, which dictates what resources or actions the entity is permitted to access. At the top of the pyramid is governance, overseeing and managing the rules of authentication and authorization. Only when each level of the pyramid is reached can we begin to consider the next step, then move towards the final goal of standardization.

As development platforms like Kubernetes become ubiquitous, it's essential to establish an open-source standard for consistently and securely identifying software systems – as all workloads need verifiable IDs. When all vendors adopt the same standard, tools and systems from different sources can better integrate and communicate, which will improve compatibility and extend the reach of solutions. By establishing governance standards, organizations can better protect themselves from increasing risks. This ensures that security and IT teams can identify, manage, and govern workloads, regardless of where they are running. One example of an open-source standard is SPIFFE, the Secure Production Identity Framework For Everyone. SPIFFE is in the same foundation as Kubernetes – the Cloud Native Computing Foundation (CNCF) along with many of the other projects it’s likely to interoperate with. Although it's built for and designed with Kubernetes in mind, it can also be applied to traditional, proprietary on-premises solutions which makes it powerful for Platform Engineers and Infosec teams alike.

Securing digital workloads

Identity security isn't just about protecting human identities anymore. The perimeter is dead, and services are now running everywhere – from on prem to the cloud and beyond. Just as employees must verify their identities to keep your business secure, machines and workloads interacting with one another need to do the same. This helps IT teams manage and secure workloads across various cloud environments more effectively.

Without this, the risk of exposure, compliance violations, and security breaches increases. Open standards like SPIFFE ensure consistent and verifiable IDs for all entities, enhancing compatibility and security. As cloud adoption and multi-cloud environments grow, addressing the identity security of both machines and workloads is crucial. This is key to reducing risks and boosting overall organizational security.

We've featured the best online cybersecurity course.

This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro

Matt Barker is VP & Global Head of Workload Identity Architecture, Venafi.

Read more
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
Abstract image of cyber security in action.
Protectors of the modern world: defending against Shadow ML and Agentic AI
Security padlock in circuit board, digital encryption concept
MFA alone won’t protect you in 2025: the new cybersecurity imperative
An abstract image of digital security.
Identifying the evolving security threats to AI models
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Cyber-security
The definitive guide to credential collaboration
Latest in Pro
Isometric demonstrating multi-factor authentication using a mobile device.
NCSC gets influencers to sing the praises of 2FA
Sam Altman and OpenAI
OpenAI is upping its bug bounty rewards as security worries rise
Context Windows
Why are AI context windows important?
BERT
What is BERT, and why should we care?
A person holding out their hand with a digital AI symbol.
AI is booming — but are businesses seeing real impact?
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Dangerous new CoffeeLoader malware executes on your GPU to get past security tools
Latest in News
Nintendo Switch 2 Joy-Con up-close from app store
Nintendo's new app gave us another look at the Switch 2, and there's something different with the Joy-Con
cheap Nintendo Switch game deals sales
Nintendo didn't anticipate that Mario Kart 8 Deluxe was 'going to be the juggernaut' for the Nintendo Switch when it was ported to the console, according to former employees
Three angles of the Apple MacBook Air 15-inch M4 laptop above a desk
Apple MacBook Air 15-inch (M4) review roundup – should you buy Apple's new lightweight laptop?
Witchbrook
Witchbrook, the life-sim I've been waiting years for, finally has a release window and it's sooner than you think
Amazon Echo Smart Speaker
Amazon is experimenting with renaming Echo speakers to Alexa speakers, and it's about time
Shigeru Miyamoto presents Nintendo Today app
Nintendo Today smartphone app is out now on iOS and Android devices – and here's what it does