The security challenges of unattended robots

Someone shaking hands with an AI through a laptop screen.
(Image credit: Pixabay)

When robotic process automation (RPA) first appeared on the market a few years ago, it was heralded as a step-change technological solution, with the global RPA market size expected to reach $11 billion by 2027. As software robots took on the most monotonous and repetitive activities, they would free up employees to focus on more important, cognitive, and creative ones while also improving efficiency, accuracy, agility, and scalability.

About the author

Brandon Traffanstedt, Sr. Director, Global Technology Office at CyberArk.

At the time, many employees expressed concerns that RPA would lead to them losing their employment, rather than allowing them to concentrate on higher-level, more thoughtful work. However, RPA is successfully being utilized to supplement, rather than replace, human resources, enabling workers to use their experience and capabilities in a more engaging and beneficial way, rather than focusing on manual and time-consuming processes. Automating operations in this way has its advantages for businesses too. But RPA does come hand-in-hand with some specific security issues, which forward-thinking organizations will want to consider.

As with other new and powerful technological initiatives that come into the business, cybersecurity teams have shown concern about handing over control of RPA. Because this is a market that is set to grow however, businesses and their security teams must act now to better understand, manage and control RPA.

The evolution of RPA

Organizations across multiple industries have embraced RPA as a means of solving business problems. Early implementations of RPA allowed for automation, but also necessitated human supervision. Semi-attended bots were employed in RPA applications, which required a person to hit the ‘go’ button in order to accomplish a task – and also required that user’s digital identity to do so.

As we move into the digital-first world however, ‘citizen developers’ – employees who use low-code or no-code mobile app development software to design their own automated processes – came to the fore. Many of these developers wanted to take automation to the next level by implementing entirely unattended robots – the RPA holy grail.

The ‘but’ is this: Unattended robots require access to the same networks, systems, and applications as their human counterparts. This includes access to mission-critical enterprise systems which require privileged access at the highest level. This access makes robot credentials and identities just as vulnerable as those tied to a real-life person, and if they’re not properly secured, can provide hackers with another avenue for stealing data and causing havoc.

It's unsurprising, then, that the usage of unattended bots created a schism between security and automation teams, with the former demanding more strict security measures and the latter struggling to implement them owing to a lack of knowledge or time. The stern recommendations some security personnel were recommending had an adverse impact on citizen developers, discouraging many. This led to some resigning themselves to relying on attended automation, which hindered creativity and innovation, while others went ahead and adopted non-approved RPA programs, creating gaps in their company's cyber security.

Securing unattended automation

Fortunately, these security problems may be addressed in a way that allows for the usage of secure unattended robots, improved innovation for citizen developers, and without demanding additional work from the people organizations are wanting to free up.

This is accomplished by the automated and centralized management of RPA credentials. All hard-coded privileged credentials are removed from robot scripts and replaced with an API call pointing to automatically rotate credentials maintained in a secure, centralized repository – rather than manually assigning, managing, and upgrading the credentials a bot needs to do its work.

This ensures that security mechanisms, such as credential rotation, multifactor authentication, password uniqueness and complexity requirements, and the suspension of privileged credentials are all implemented consistently.

Giving bots their own unique identity, credentials, and entitlements is also a best practice. It ensures non-repudiation and separation/segregation of duties, as well as limits access to the applications and databases bots need to do their job. This is similar to limiting a human user's access or rights to the bare minimum required for their work.

Unlock the power of RPA

An all-in-one automated centralized repository solution removes previous hurdles, but organizations must adopt DevSecOps and bring automation and security together from the start to completely unlock the power of the citizen developer and the ultimate benefits of RPA.

By engaging with security teams and professionals proactively and early, RPA teams and citizen developers will be able to effectively scale the number of RPA bots in their organization, without introducing security risks or slowing down innovation.

We feature the best identity management software.

Brandon Traffanstedt, Sr. Director, Global Technology Office at CyberArk.

Read more
IT
Need to shine a light on shadow IT? Start with process
Avast cybersecurity
How to address Shadow IT challenges in the age of GenAI
An abstract image of digital security.
Looking before we leap: why security is essential to agentic AI success
Avast cybersecurity
How to beat ‘shadow AI’ across your organization
An abstract image of a lock against a digital background, denoting cybersecurity.
Building a resilient workforce security strategy
An abstract image of digital security.
Identifying the evolving security threats to AI models
Latest in Security
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
HTTPS in a browser address bar
Malicious "polymorphic" Chrome extensions can mimic other tools to trick victims
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in Features
The player attacks an enemy in Judgement.
The latest PlayStation sale is here, and these are the five games under $15 / £15 I've got in my basket
The Blades of Fire key art.
MercurySteam CEO discusses upcoming new IP Blades of Fire: 'We love third person action adventure games and we wanted to revisit the genre'
The Personalised Sound Wizard on the LG C5, showing the testing process with multiple choices on the screen
I saw the LG C5 OLED TV's new personalized sound mode in action, and it's the best AI TV feature I've seen so far
ER doctors, including Dr. Michael "Robby" Rabinavitch (Noah Wyle) attend to a patient in The Pitt
Max's #2 show The Pitt has left viewers breathless – here are 3 more medical dramas with over 85% on Rotten Tomatoes to get your heart pounding
The landscape in Atomfall.
Atomfall art director breaks down the survival game's condensed Lake District setting: 'It wasn't so much about how far you travel, but how many things you see along the way'
Uma Thurman looks out of a window and looks serious
Apple TV+ sells an Original thriller series to a rival streaming service for the first time, despite it starring Uma Thurman