We’re excited to announce the launch of our MCP server for Apono administrators — giving security and DevOps teams the ability to surface complex access data instantly, without the endless API queries, spreadsheets, or manual digging that slows everyone down.
Admins are the guardians of access. But when they need answers like “Which users are included in this access flow?” or “Who has access to production?”, getting that data today can take hours. Teams often wrestle with APIs or cobble together manual exports, creating bottlenecks and frustration while slowing down audits and compliance.
The Admin MCP changes that.
AI assistants like Cursor, Claude, and Amazon Q are redefining how teams work. Instead of navigating multiple tools, admins can simply ask questions in natural language and get structured, reliable answers.
Model Context Protocol (MCP) makes this possible by connecting AI assistants directly to enterprise systems. Think of it as the “USB-C” of enterprise workflows — a standard that lets AI securely query and retrieve information from your most critical tools.
For admins, this means compliance checks, audits, and day-to-day governance tasks can be handled faster and with greater confidence.

Our Admin MCP Server applies this model to access governance:
All operations are logged to ensure full traceability and auditability.

With the Apono MCP Server, admins can:
The Apono Admin MCP Server makes life easier for security and compliance teams while improving governance across the board:
Admins can work directly in the tools they already use:
This means admins don’t need to leave their workflow to chase down access data — it comes to them.
With Apono’s Admin MCP Server, access governance becomes faster, smarter, and more auditable.
Admins can instantly surface the answers they need for compliance, troubleshooting, or security reviews — freeing up valuable time while keeping risk under control. Reach out to us to start the conversation and request a demo of the Apono Admin MCP Server today.
NEW YORK – November 18, 2025 – Apono, the cloud identity-security company pioneering Zero Standing Privilege (ZSP) access management, today announced a $34 million Series B led by U.S. Venture Partners (USVP), with participation from Swisscom Ventures, Vertex Ventures, 33N Ventures, and existing investors. The round brings Apono’s total funding to more than $54 million. Over the past year, Apono established product-market fit with a fourfold increase in client count.
Apono’s platform helps enterprises manage the explosion of cloud permissions by eliminating standing privileges, a long-standing vulnerability in identity and access management. Built on Just-in-Time (JIT) and Just-Enough-Access (JEA) models, Apono grants and revokes access dynamically based on real-time context and business logic, ensuring teams can move fast without compromising security.
The company’s vision anticipates a future where human and AI identities coexist and collaborate. As agentic systems proliferate, managing their access requires a level of automation, context-awareness, and scale that static IAM models can’t deliver. Apono’s dynamic permissioning engine meets that challenge by validating every access request in real time, enforcing security without slowing down developers or operations.
“The large-scale adoption of AI agents exponentially scales the problem of getting access right,” said Rom Carmel, Co-founder and CEO of Apono. “Achieving ZSP with a dynamic access management approach is the only sustainable way to secure Agentic operations at scale.”
Customers, including Intel, Hewlett Packard Enterprise, and Monday.com, rely on Apono to secure access across hybrid and multi-cloud environments while meeting compliance standards and accelerating incident response.
Jacques Benkoski, General Partner at USVP, will join Apono’s board. A longtime enterprise software investor, Jacques has helped scale leading cybersecurity companies, including Trusteer, Medigate, and Kenna Security. He will work closely with Rom Carmel, Ofir Stein, and the Apono team to help drive the company’s growth and leadership in the emerging field of agentic identity security.
“Apono is leading the next evolution of identity security – one that brings zero trust to identity access, following the zero trust of network access we’ve seen in recent years,” said Jacques Benkoski, General Partner at USVP. “The company’s dynamic, context-aware approach is exactly what enterprises need to secure both human and machine identities in the AI-driven era.”
The new funding will be used to accelerate development of AI-powered access intelligence and policy automation, expand go-to-market operations in the U.S. and new international markets, and scale Apono’s engineering and sales teams to meet growing enterprise demand.
Apono will be featured at AWS re:Invent, December 1–5, 2025, in Las Vegas, NV., where attendees can see live demos of its dynamic access platform built for this new era.

Apono is redefining identity security with its Cloud Privileged Access Platform, purpose-built for the agentic AI era. Founded by cybersecurity and DevOps veterans, Apono empowers enterprises operating in modern cloud environments to eliminate standing privileges and adopt just-in-time, just-enough access across all identities – human, machine, and AI agents. Trusted by global Fortune 500 companies, Apono bridges the gap between security and engineering teams, enabling organizations to move fast without compromising security.
Contact Information
Stephen Lowing, VP Marketing
[email protected]
apono.io
New research out of AhnLab documents the Cephalus ransomware group has been aggressively exploiting stolen Remote Desktop Protocol (RDP) credentials to break into networks and execute rapid, destructive encryption campaigns.
The pattern is straightforward and brutal: credentials get you in, and once inside the attackers move fast to blind and break recovery.
According to the reporting in cybersecuritynews.com, the Cephalus crew is using tried and true tactics:
Standing credentials that can log in to RDP are an attacker’s fast track: they bypass perimeter controls, enable hands-on-keyboard operations, and let operators neutralize defenses from the inside.
When credentials are reusable and access is always-on, an attacker’s path from access to impact is gut-wrenchingly short.
So how can organizations protect themselves in these cases?
Apono enables security teams to implement Zero Standing Privileges across their cloud and hybrid environments, including RDP access to machines hosted on AWS, Azure, GCP, and on-prem.
Here are just a few of the ways that Apono empowers teams to reduce their access risk while streamlining unimpeded access for engineers.
Eliminate standing access — Stop attackers from abusing always-on privileged access by shifting to Just-in-Time (JIT) access elevation for both humans and machines.
Reduce blast radius — Continuously rightsize privileges with data-driven recommendations so stolen credentials have far less ability to damage systems or stop recoveries.
Quarantine risky privileges without breaking things — Apply reversible deny policies to neutralize dangerous standing access immediately, preserving uptime while removing attacker pathways.
Centralize governance and detection — Tie JIT workflows, session brokering, and alerting into a single policy surface so you can block credential-driven attacks faster and recover more confidently.
Enforce MFA for sensitive access flows — Apono can require authenticator-app verification for JIT requests and logs MFA events to the audit trail so elevated sessions are tied to confirmed second-factor approval.
Credential-based ransomware like Cephalus is predictable: it exploits access we already grant.
Eliminating standing privileges and making elevated access temporary removes the easiest path attackers use. If you want to quickly identify where those risks still exist, start with our Zero Standing Privileges (ZSP) Checklist and benchmark your current exposure.
To see how detection, automated remediation, and JIT enforcement work together in real time, visit our Access Threat Detection & Response page
Privileged accounts are often treated as background plumbing until something goes wrong. They sit across cloud consoles, databases, and pipelines and have the power to alter configurations or bring production to a halt, making them a favorite target of bad actors.
Credential theft surged 160% in 2025, making stolen identities one of the fastest-growing attack vectors. When those stolen credentials belong to privileged accounts, the exposure isn’t limited to one system; it can spread across the whole environment.
A privileged access management audit is one of the few ways to pressure-test your organization’s ability to withstand this reality: identifying where privileged access lives, how it’s controlled, and whether the guardrails actually hold when it matters.
A Privileged Access Management (PAM) audit is a structured review of how your organization grants, monitors, and controls elevated access. Unlike general access reviews, it focuses on the most sensitive accounts, such as administrators, database owners, CI/CD pipelines, and cloud root credentials, which, if misused, can lead to breaches and compliance failures.
From a compliance standpoint, a PAM audit demonstrates your organization’s adherence to frameworks like SOC 2, HIPAA, GDPR, and CCPA, which all require strict controls over privileged access. On the security side, the audit identifies risky standing permissions, unused or over-privileged accounts, and gaps in access governance that could be exploited in identity-based attacks such as credential theft or insider misuse.
PAM differs from Identity and Access Management (IAM) audits. IAM reviews look across the workforce to determine role appropriateness. PAM audits go deeper into the highest-risk accounts where a single misconfiguration can lead to lateral movement or critical outages.

In modern cloud and SaaS environments, non-human identities (NHIs)—service accounts, API keys, machine identities, bots, and agents— outnumber human identities by 80:1. This proliferation introduces a lack of visibility over stale, long-lived tokens and over-privileged service accounts. When compromised, an NHI can be abused to conduct malicious activities, from exfiltrating data to moving laterally across systems and triggering destructive agent-to-agent chains. It’s more critical than ever to treat NHIs with the same rigour as human admins, such as moving NHIs from static, long-lived keys into automated Just-in-Time (JIT) and Just-Enough Privileges (JEP) flows.
A PAM audit tests whether access models can withstand real-world pressure, with five key goals.
The starting point is a complete inventory of privileged accounts across infrastructure, SaaS, and hybrid environments. Shadow admins and dormant credentials often go unnoticed but can be exploited as entry points. Don’t forget that a complete inventory eliminates blind spots and extends to non-human identities, which often lack MFA or visibility but can be abused as powerful entry points.
Auditors examine whether access is restricted to the minimum required, both in scope and time. Standing privileges or overly broad entitlements signal persistent risk, even if they are rarely used. The test is whether the least privilege is enforced in daily operations, not just written in policy.
How access is granted matters as much as who receives it. Auditors review whether workflows include measures such as multi-factor authentication, just-in-time approvals, and human oversight, and whether these steps are consistently applied.
Privileged activity must be traceable. Auditors look for detailed, tamper-resistant logs that link actions to specific identities and preserve enough context to support investigations. Strong logging is the foundation of accountability.
Another tick-box for auditors is whether privileged access controls map directly to frameworks like SOC 2 and GDPR. This step is about demonstrating that practices meet external requirements, not just internal expectations.

Here’s what auditors and regulators look for when assessing whether privileged access is secure and accountable.

Most organizations underestimate the number of privileged accounts in their environment. Privileged identities go beyond administrators in hybrid setups spanning SaaS platforms, cloud services, and legacy infrastructure. They include NHIs like API tokens and machine accounts, which rarely rotate credentials and fall outside the visibility of central IAM oversight.
Why it matters: Forgotten or orphaned accounts are common targets for attackers, since they often lack MFA or monitoring.
Auditors look for: A dynamic inventory that is continuously updated, not a static spreadsheet compiled ahead of an audit.
Best practice: Automate discovery and classification to identify all privileged identities, and assign a clear owner for each account’s lifecycle. Using a cloud-native access management platform provides continuous discovery across cloud and SaaS environments, making privileged identities visible and traceable.
Enforcing least privilege is one of the most complex parts of PAM and applies to human and non-human identities. Developers and administrators often accumulate entitlements beyond their needs over time. A PAM audit examines whether permissions are limited in scope, time-bound, and automatically revoked.
Why it matters: Standing privileges remain risky even when accounts are idle.
Auditors look for: Proof that access is temporary and scoped, including just-in-time provisioning, role-based permissions, and consistent automated revocation.
Best practice: Retire static admin groups for contextual, time-limited roles. Monitor exceptions closely to prevent privilege creep, which keeps security controls practical for engineering teams while reducing long-term exposure. Additionally, machine identities should be scoped to task-specific, short-lived permissions under a JEP model.
Privileged access needs to follow a clear, documented process. Ad hoc approvals over email or chat leave no reliable record and create gaps in accountability. Auditors determine whether requests are routed through structured channels, with approval criteria defined and evidence preserved for review.
Why it matters: Informal workflows make access decisions opaque and vulnerable to mistakes or bias.
Auditors look for: Request trails that record who requested access, who approved it, and why. Multi-factor approvals are now standard for high-risk requests.
Best practice: Integrate access workflows into the tools engineers already use. Approvals through Slack, Teams, or CLI allow teams to move quickly while leaving an auditable trail.

Once privileged access is granted, organizations need complete visibility into its use. PAM audits assess whether sessions can be reconstructed in detail, including logins and the commands executed, configurations changed, and data accessed.
Why it matters: Without detailed logs of privileged sessions, organizations lose both forensic evidence and accountability.
Auditors look for: Tamper-resistant logs tied to individual identities rather than shared accounts, and centralized for consistent retention and review.
Best practice: Route privileged activity logs into SIEM or SOAR platforms for correlation and alerting. Run regular spot checks to confirm accuracy so the data supports investigations and ongoing operations.
Revoking access manually is error-prone. Under pressure, administrators often overlook accounts after projects close or roles change. PAM audits check whether expiration is built into the system by default.
Why it matters: Dormant accounts are a common attack vector. If unused rights remain active, they also contradict least-privilege principles.
Auditors look for: Expiration policies applied to human and machine identities, with revocation tied to triggers such as session end, project completion, or HR system updates.
Best practice: Use automated policies that enforce time-bound access. Schedule periodic reviews to catch exceptions or drift. Automation reduces the chance of oversight and keeps privileges aligned with actual need.
Outages and security incidents sometimes require immediate intervention. Break-glass mechanisms give engineers rapid access in those moments while keeping the activity logged and accountable.
Why it matters: High-pressure situations can lead teams to cut corners. Without structured emergency flows, organizations resort to insecure workarounds.
Auditors look for: Documented policies for break-glass use, detailed logs of each event, and retroactive approvals or justifications. They also expect access to be narrowly scoped and time-limited.
Best practice: Define emergency roles with limited privileges, require post-incident justification, and set automatic expiration. This best practice keeps response times fast while ensuring access remains auditable.

PAM controls must align with (and provide evidence for) established frameworks like SOC 2, HIPAA, GDPR, and ISO 27001.
Why it matters: Demonstrating compliance is often as critical as preventing breaches. Regulators, customers, and partners expect clear proof that privileged access is governed appropriately, supported by robust cloud security controls.
Auditors look for: Reports that link specific controls to compliance clauses, supported by evidence.
Best practice: Automate reporting so compliance data is produced continuously, rather than assembled only at audit time, which makes audit readiness part of daily operations.
PAM audits now look beyond static controls to how organizations detect anomalies, such as an API key suddenly accessing new regions or service accounts running commands outside their normal workflow.
Why it matters: Many attacks begin with stolen credentials that appear valid. Behavioral monitoring is often the only way to distinguish legitimate use from misuse, and it’s a core component of broader cyber resilience.
Auditors look for: Defined monitoring systems, clear escalation paths for alerts, and records showing how anomalies were investigated and resolved.
Best practice: Feed PAM activity data into SIEM platforms to flag suspicious patterns, and run tabletop exercises to validate detection and response. Apono’s cloud-native platform integrates privileged activity into security monitoring pipelines, giving teams faster visibility into high-risk behavior.
Vendors and contractors often need privileged access but don’t always receive the same level of oversight as internal staff. PAM audits examine how third-party accounts are provisioned, monitored, and retired.
Why it matters: Compromised vendor accounts can become the most straightforward path into critical systems.
Auditors look for: Defined onboarding and offboarding workflows, time-limited entitlements, and audit logs that cover external users as thoroughly as internal ones.
Best practice: Grant vendors just-in-time access with narrowly scoped privileges and automatic expiration. Incorporating offensive cybersecurity techniques into your testing program ensures these third-party controls are validated continuously, not just at audit time.
| Component | Why it Matters | Auditors Look For | Best Practice |
| Comprehensive Inventory of Privileged Accounts | Forgotten or orphaned accounts are common attack targets. | Dynamic inventory continuously updated, not static spreadsheets. | Automate discovery & classification; assign lifecycle owners; use cloud-native discovery. |
| Verification of Least Privilege Enforcement | Standing privileges remain risky even when accounts are idle. | Proof that access is temporary, scoped, and revoked automatically. | Replace static admin groups with time-limited roles; monitor exceptions; use JEP for machine identities. |
| Access Request and Approval Workflows | Ad hoc approvals create gaps in accountability. | Clear request trails showing requester, approver, and reason. | Integrate workflows into Slack, Teams, or CLI with auditable trails. |
| Session Monitoring and Logging | Without detailed logs, forensic evidence and accountability are lost. | Tamper-resistant logs tied to identities and centralized for review. | Route logs into SIEM/SOAR; perform spot checks for accuracy. |
| Automated Access Expiration and Revocation | Dormant accounts are a common attack vector. | Expiration policies for human and machine identities with automatic revocation. | Use automated, time-bound policies; schedule periodic reviews. |
| Break-Glass and On-Call Access Mechanisms | Emergency access can bypass security without proper controls. | Documented policies, detailed logs, and retroactive justifications. | Define emergency roles with scoped privileges; require justification; enforce auto-expiration. |
| Compliance Alignment and Reporting | Clear proof of privileged access governance is required for regulators, customers, and partners. | Reports mapping controls to compliance clauses with supporting evidence. | Automate continuous compliance reporting to stay audit-ready. |
| Continuous Monitoring for Anomalous Behavior | Behavioral monitoring is often the only way to detect credential misuse. | Defined monitoring systems, escalation paths, and investigation records. | Integrate PAM data into SIEM; run tabletop exercises; use anomaly detection. |
| Vendor and Third-Party Access Controls | Compromised vendor accounts are a major entry point for attackers. | Onboarding/offboarding workflows, time-limited entitlements, and full audit logs. | Grant JIT access with scoped privileges; enforce MFA; log all vendor activity. |
Privileged access has always been highly risky, and the rise in credential theft shows that traditional controls are not enough. A PAM audit helps uncover weak points before they’re exploited, but audits alone don’t close the gaps.
Apono steps in to automate JIT access, eliminating standing permissions that attackers often abuse. Auto-expiring privileges ensure access is revoked as soon as it’s no longer needed. Plus, engineers can request access in Slack, Teams, or CLI with every step logged. In emergencies, Apono’s break-glass and on-call flows give immediate access but still record detailed logs of who accessed what and when. Book an Apono demo and explore how automated PAM audits save time and reduce risk.
How context‑aware, short‑lived roles eliminate privilege sprawl and accelerate secure engineering without overburdening admins
Access management for remote resources has come a long way from VPNs and bastion hosts. The rise of cloud platforms, microservices and remote workforces has driven a shift toward Cloud-native security controls that integrate directly with AWS, Azure, GCP and Kubernetes. By talking directly to a cloud provider’s API, you avoid detours through proxy gateways, reducing latency and complexity.
Yet among Cloud-native platforms, there’s a stark difference in how they handle permissions. Some require security teams to pre‑create roles and permission sets, attaching them to identities or groups. Others assemble roles on the fly, taking into account who’s asking, what resource they need, why they need it and how sensitive it is. It’s a subtle but important distinction—one that determines whether your organization stays agile and secure or gets bogged down by privilege sprawl and bottlenecks when it comes to provisioning access.
Defining roles ahead of time seems sensible: you map out what engineers in a given team should be able to do and codify those permissions in your identity provider. Many platforms—even some cloud‑native ones—are built on this model. Administrators must build bundles of permissions in advance and decide who can use them.
In today’s dynamic environments, these pre‑created roles don’t age well. Consider the following pain points:
The alternative is to create permissions dynamically, directly on the resource at the moment of need. Rather than assigning users to broad roles, an API‑driven platform evaluates business context and environmental context to compose a least‑privilege role:
By combining these signals with live resource inventories and risk scores, the platform generates a granular IAM role or database policy. It grants only the permissions needed—no more, no less—and sets a short time‑to‑live. When the window expires or the user revokes it manually, the role disappears. This eliminates standing privileges, reducing the blast radius and shrinking the attack surface.
Unlike pre‑built roles, on‑demand roles adapt to changes automatically. Add a new AWS service or deploy a new Kubernetes namespace, and the platform knows how to grant access without manual intervention. There’s no catalogue of roles to keep up to date.
From an admin and security perspective, the advantages of on‑the‑fly roles extend beyond basic convenience:
Static role environments suffer from two chronic issues: sprawl and permission delays.
By generating roles dynamically, you avoid both extremes. Permissions are granted only when justified and revoked when no longer needed. Engineers get exactly what they need, and nothing sticks around to clutter your environment or widen the attack surface.
Role management is often viewed as administrative toil—necessary but not strategic. On‑demand role platforms transform it into a policy exercise. Security teams define guardrails:
The platform then executes those rules at scale, interacting with IAM APIs, databases and Kubernetes RBAC to create and remove roles. Administrators no longer spend hours translating business requests into JSON policy documents; instead, they review policy changes and investigate exceptions.
There’s no one‑size‑fits‑all solution. Organizations with static, on‑prem infrastructure might find that pre‑defined roles remain manageable. If your applications rarely change and your user base is small, a handful of roles may suffice. However, most security leaders are grappling with rapid cloud adoption, microservices and globally distributed teams. In these environments, static role catalogues cannot keep up without sacrificing security or productivity.
On‑demand roles strike a balance: they provide the flexibility engineers need to do their jobs while enforcing the controls security leaders require. By incorporating business context, identity information, risk signals and external workflows, they deliver least‑privilege access that adapts in real time and vanishes when no longer relevant.
Breaking down the trade-offs between API integration and proxy gateways for modern access management
The way organizations manage access has fundamentally shifted. In the past, infrastructure was mostly static—centralized data centers, long-lived servers, and predictable traffic patterns. You could rely on VPNs, firewalls, and a fixed set of roles in your identity provider. Access paths were clear, and change was infrequent.
But that’s no longer the case.
Today’s modern cloud environments are built for speed, scale, and change. Engineering teams push code constantly. Resources are ephemeral—spun up and torn down in minutes. Your infrastructure might span AWS, Azure, and GCP, including Kubernetes clusters, serverless functions, SaaS apps, and dynamic databases. And your workforce is distributed, collaborating across time zones and tools.
That complexity breaks traditional access models.
To address these challenges, two primary models have emerged for managing Just-in-Time (JIT) access:
Below we explore where each approach has its strengths and where they may fit in for managing your environments.
Proxy‑based solutions grew out of on‑prem networks. They require you to install and manage proxy servers and/or client-side agents that sit between users and resources. That architecture introduces extra moving parts and forces you to re‑route traffic through dedicated gateways.
API‑driven platforms take a different tack. They integrate directly with your cloud and infrastructure providers. There are no network changes, no additional servers to maintain, no VPN or bastion host to babysit, and no additional client side component to install. Deployment happens through familiar automation tools—Terraform modules, CloudFormation templates, Helm charts—so you can add JIT controls without redesigning your network.
Key takeaways:
One of the biggest drawbacks of proxy‑based systems is their reliance on pre‑defined roles and session logs. Access is granted at a network or account level; if you need something more granular, an administrator has to create and maintain new roles.
Monitoring is very problematic because of the disconnect many times to the proxyed account they are using. Session logs that IR teams leverage see a single or obfuscated account and not the real person that was on the other side of the proxy.
API‑based platforms turn that model on its head. The more mature platforms do not depend on the precreated, static roles but instead evaluate business context and risk (think: the resource you’re touching, your current on‑call schedule, the justification in your ticket) and generate granular roles on the fly.
Those roles exist only as long as necessary—minutes or hours instead of days or weeks—so there’s no standing privilege to attack. Because the access decision happens at the resource level, you can grant “read‑only” on a specific S3 bucket or database schema instead of giving blanket access to an entire cloud account.
What that means for you:
Proxies excel at securing SSH sessions into servers. But today’s infrastructure is more than SSH: it’s Kubernetes clusters, managed databases, serverless platforms and SaaS applications. Proxy tools often struggle outside of network‑level access because they weren’t built for it.
API‑based platforms are designed for this complexity. They connect via the native APIs of AWS, Azure, GCP and Kubernetes, understand cloud identities and roles, and speak the language of your CI/CD pipeline. They also integrate with collaboration tools like Slack and Teams so engineers can request and approve access without leaving their chat client.
For teams working across multiple clouds or adopting cloud‑native services, the differences are tangible:
A proxy‑based system still has its place. If your environment is largely on‑prem, composed of long‑lived servers and network boundaries that rarely change, a proxy can provide a straightforward way to centralize control. It can be easier to bolt onto a static network where traffic patterns are predictable.
That said, you’ll need to accept the operational overhead—deploying and maintaining proxy nodes and clients, managing agent versions and steering traffic through those gateways. In environments where agility matters or where cloud adoption is accelerating, that trade‑off often becomes a liability.
If your organization runs in the cloud, API-based JIT platforms offer the fastest path to enforcing least-privilege access—without the complexity of proxies or the rigidity of static roles.
Apono takes this further.
As a cloud-native platform, Apono delivers ephemeral, context-aware access directly on the resource. It evaluates real-time identity, risk, and business signals to automate just-in-time, just-enough permissions—eliminating manual role maintenance and reducing overexposure.
Proxy-based tools may work for static, on-prem environments—but they often fall short in modern, dynamic infrastructure.
Let us show you how Apono fits your cloud-native environment and book your personalized demo today.
New details are emerging about a wave of intrusions into Amazon Web Services environments. Attackers are reportedly weaponizing AWS IAM, using it to validate stolen credentials and turn identity controls into a springboard for in-cloud abuse.
According to new research from Fortinent, attackers are leveraging the open source TruffleHog tool to automate testing of stolen AWS credentials in what they are calling the TruffleNet infrastructure.
In their report, researchers say that the hackers are abusing AWS IAM to actually test the validity of their stolen credentials using a GetCallerIdentity call.
Once inside their targets’ environments, attackers are exploiting the compromised infrastructure to carry out Business Email Compromise (BEC) attacks via AWS’s Simple Email Service (SES).
Additionally, Fortinent’s researchers observed that the attackers were using the AWS CLI to query the GetSendQuota API for SES. They believe these queries to be a part of the abuse of SES for use in their downstream attacks like the BEC attacks that have been cited in the researchers’ report.
Read Fortinent’s blog post for more info on how the attackers are leveraging open source tools and AWS infrastructure, as well as the tricks used for their BEC campaign.
At this stage, the BEC attacks appear to be the “smash and grab” part of the plan.
But researchers note that the hackers are also leveraging their infiltration capabilities to carry out reconnaissance inside the compromised infrastructure.
This snooping around can be the crucial first step in future stages of their operations where attackers can go after sensitive resources like regulated data (think PII & PHI) as well as production environments that can harm the business.
There are a number of valuable take aways from this story that reinforce what we know surrounding the risks of compromised credentials:
Remove Standing Access
By eliminating standing access the attacker cannot use any attached privileges to access resources, even if an identity is compromised. By moving to a Just-in-Time (JIT) access model, all access is made available to identities, human or not, temporarily and instantaneously. This ensures that access privileges are not abused and improves developer velocity.
Minimize the Blast Radius
Continuously reduce privileges to support least-privilege ops via a Just-Enough (JEA) approach. Apono’s Access Discovery capabilities uncover overprivileged identities and provide data-driven recommendations on how to reduce privileges without impacting productivity, all based on real usage.
Simplify Remediations
Apono’s approach to reducing privileges steps away from the binary of choosing to either leave risky privileges in place or revoking privileges that can break processes. Risky privileges can be quarantined via Access Flow deny policies, enabling security teams to quickly remove the risk and quickly reverting access if needed.

Apono enables organizations to adopt a Zero Standing Privileges (ZSP) approach in support of their Zero Trust initiatives.
See how Apono can help your organization prevent credential-based attacks while keeping teams fast and productive. Visit apono.io/jit-and-jep/ to learn more about our platform or request a demo.
AI is rewriting the rules of privileged access, but the rise of AI agents is creating a governance crisis. Threats like credential stuffing and privilege escalation are now accelerated by autonomous systems moving faster than humans can react.
82% of companies deploy autonomous AI agents, but 23% of IT teams admit those bots have already been tricked into revealing credentials—and fewer than half have guardrails in place. In modern infrastructure, machine identities now outnumber humans 80:1. These non-human identities (NHIs) power everything from APIs to AI pipelines, and each one needs access.
The problem? Legacy PAM tools, which remain vault-centric, weren’t built for this scale. Cloud PAM solutions step in with just-in-time, least-privilege access to shrink your attack surface and keep both humans and machines in check.
Privileged Access Management (PAM) controls and monitors the use of accounts with elevated permissions. It is closely related to enterprise identity management, and traditional PAM meant vaults, long-lived credentials, heavy-handed approvals, and developer friction.
Cloud PAM solutions are the modern evolution of PAM, purpose-built for cloud-native and API-driven environments. Instead of relying on static roles and clunky approvals, cloud PAM delivers on-demand, time-bound access through automation and integrations. These solutions use Just-In-Time (JIT) access to issue ephemeral credentials that expire automatically, ensuring no leftover privileges are waiting to be exploited.
Cloud PAM is designed to secure not just human admins but also the massive number of non-human identities (service accounts, API keys, and ML pipelines) that dominate today’s AI-driven workloads.
| Feature | Legacy PAM | Cloud PAM |
| Architecture | Built for on-premises, data center environments | Cloud-native, API-first, designed for distributed systems |
| Access Model | Static roles and long-lived credentials stored in vaults | Just-In-Time (JIT) access with ephemeral, auto-expiring permissions |
| Deployment | Heavy agents, complex setup | Lightweight integrations, deploys quickly in cloud stacks |
| Scope of Protection | Focus on human administrators | Secures both human and non-human identities (service accounts, API keys, ML pipelines) |
| Scalability | Limited flexibility, difficult to scale across multi-cloud | Dynamic, scalable for cloud-native and AI workloads |
| Risk Exposure | Standing privileges, static secrets, higher attack surface | Least-privilege, time-bound access reduces attack surface |
AI workloads bring massive growth in both human and non-human identities, and here are four reasons why cloud PAM solutions are superior for modern problems:
🔍 Evaluate Your Next Cloud PAM Move
Not all PAM tools were built for AI-driven environments. Download the Access Platform Buyer’s Guide to see how leading security teams evaluate Cloud PAM capabilities — from Zero Standing Privilege to Non-Human Identity control.
Not all PAM platforms are built for cloud-native, AI-driven environments. When evaluating modern cloud PAM tools, these features should be at the top of your list:

With so many cloud PAM tools on the market, choosing the right one for AI-heavy environments means focusing on more than just credential storage. Here’s what to look for:
Let’s break down the best privileged access management software options for cloud-native and AI-driven workloads.

The Systancia Cleanroom solution enables session isolation and real-time monitoring to protect critical systems from credential theft and insider threats. Unlike traditional vault-centric PAM, Systancia delivers a cloud-native approach that prioritizes user experience and regulatory compliance.
Main Features:
Best for: Regulated industries needing strong session isolation.
Price: By inquiry.
Review: “It’s easy to understand and use. [I like the features, such as] password rotation, recording sessions, white room administration, MFA, [and more].”

Apono is a cloud-native access management platform purpose-built for the scale and speed of modern, AI-driven environments. Unlike vault-based PAM, Apono delivers an API-first model that automates JIT and least privilege access for both human and non-human identities. By issuing ephemeral, auto-expiring permissions, Apono ensures users and services get precisely the access they need—only when they need it.
Main Features:
Best for: Cloud-native organizations running AI/ML pipelines that need to secure both human and non-human identities with fast, just-in-time access.
Price: By inquiry.
Review: “As a SecOps Manager implementing the Apono platform, I experienced significant improvements in our organization’s security posture, operational efficiency, and compliance capabilities.”

Wallix Bastion’s PAM platform focuses on delivering secure, auditable control over administrative accounts in hybrid and multi-cloud environments. Gartner recognizes it for helping enterprises enforce the least privilege and monitor privileged activity.
Main Features:
Best for: Enterprises requiring centralized credential management.
Price: By inquiry.
Review: “WALLIX PAM provides strong security for privileged access management with an intuitive interface, real-time monitoring, and robust audit logs.”

StrongDM is a modern infrastructure access platform that approaches PAM differently. Instead of traditional password vaults, it focuses on secure, dynamic connectivity. It gives developers, DevOps, and security teams centralized control over access to databases, servers, Kubernetes clusters, and cloud environments.
Main Features:
Best for: DevOps teams wanting frictionless, VPN-free access to databases, servers, and Kubernetes.
Price: By inquiry.
Review: “The integration capabilities are top-notch, allowing us to embed StrongDM into complex environments with minimal friction.”

Teleport is an open-source platform that unifies secure access to servers, databases, Kubernetes clusters, and internal applications under a single, identity-based solution. Teleport uses certificates and short-lived credentials to provide strong, auditable privileged access.
Main Features:
Best for: Engineering teams favoring open-source, zero trust access with short-lived certificates.
Price: Open-source version is free; enterprise pricing available by inquiry.
Review: “The session recording and audit logging features are incredibly useful for compliance and troubleshooting.”

CyberArk’s PAM solution combines credential vaulting, session monitoring, and threat detection to deliver enterprise-grade control over privileged accounts in hybrid and cloud environments.
Main Features:
Best for: Large enterprises and highly regulated sectors needing enterprise-grade PAM with vaulting and anomaly detection.
Price: By inquiry.
Review: “CyberArk Privileged Access Management (PAM) is an excellent tool for any organization looking to protect privileged access to critical systems and sensitive data.”

Netwrix Privilege Secure is part of Netwrix’s suite, which delivers end-to-end privileged access control with task automation and compliance built in. It’s designed to eliminate standing privileges and make administrative access safer and easier to manage across hybrid environments.
Main Features:
Best for: Organizations battling privilege sprawl who need continuous discovery.
Price: By inquiry.
Review: “[I like the] do-it-yourself proof of concept, open and straightforward commercial track, variety of architectural designs, and seamless rollout.”

While it’s broader than traditional PAM, JumpCloud is an open directory platform with privileged access capabilities designed to help organizations manage admin rights, enforce least privilege, and secure hybrid IT environments.
Main Features:
Best for: IT teams consolidating identity, device, and privileged access management into a single, all-in-one cloud directory platform (although PAM is not its core strength).
Price: Free plan available; paid plans start per user/month, with enterprise pricing by inquiry.
Review: “As a developer, I really appreciate the smooth integrations with different tools and the straightforward APIs—it saves a lot of time when setting up authentication and access controls.”
| Solution | Main Features | Best For | Price |
| Systancia | Enhanced authentication, multiple deployment modes, adaptive control levels | Regulated industries needing strong session isolation | By inquiry |
| Apono | JIT access, self-serve via Slack/Teams/CLI, auto-expiring credentials, detailed audit logs, fast deployment | Cloud-native orgs running AI/ML pipelines securing human & non-human identities | By inquiry |
| Wallix Bastion | On-prem, cloud, or managed service; context-based temporary access; password vaulting | Enterprises requiring centralized credential management | By inquiry |
| StrongDM | Session & query logs, CLI/SDK integrations, connection brokering (no static secrets) | DevOps teams wanting frictionless, VPN-free infra access | By inquiry |
| Teleport | Certificate-based access, session recording, IdP integration, identity-aware proxy | Engineering teams favoring open-source, Zero Trust access | Free OSS; enterprise pricing by inquiry |
| CyberArk | Credential vaulting, anomaly detection, integrations with major clouds/IdPs, JIT access | Large enterprises & regulated sectors needing enterprise-grade PAM | By inquiry |
| Netwrix | Privileged task automation, MFA-protected temporary access, detailed auditing & compliance logs | Orgs battling privilege sprawl needing continuous discovery | By inquiry |
| JumpCloud | Cross-platform device control, SSO & MFA, granular admin rights with JIT elevation | IT teams consolidating identity, device, and privileged access | Free plan; paid per user/month |
In an AI-first enterprise, privileged access is both the biggest enabler and the greatest risk. Cloud PAM solutions help organizations scale securely, replacing static controls with just-in-time, least-privilege access.
Apono is built for this world: API-driven, cloud-native, and designed to protect non-human identities. With ephemeral, auditable permissions, your teams move fast and your auditors stay happy. See Apono in action to explore how it secures AI workloads without slowing developers.
Identity is now the most common entry point for attackers. In cloud-native environments, thousands of microservices, containers, and agents request credentials every day, and each one represents a potential weakness. The imbalance between human and non-human identities (NHIs) is growing, but many organizations still devote the bulk of their identity and access governance (IGA) efforts to the former.
Over the past two years, 57% of organizations experienced at least one API-related breach; of those, 73% saw three or more incidents. At the same time, the global IAG market was valued at approximately $8 billion in 2024, driven by compliance frameworks such as SOC 2, GDPR, HIPAA, and CCPA that demand auditable proof of access controls.
The takeaway: static defenses built on logins and standing permissions can’t keep pace with identities that appear and disappear daily. For engineering teams, identity and access governance has shifted from a “nice-to-have” to a baseline requirement for both security and trust.
Identity and access governance (IGA) is the framework your organization can use to decide who should have access to systems, applications, and data, and whether that access is still appropriate. IGA goes beyond the mechanics of logging and instead focuses on oversight, accountability, and policy enforcement.
Most IGA programs are built around a few core practices:
Unlike identity and access management (IAM), which enforces access at runtime, IGA asks the harder question: should this access exist at all? Answering this question is harder today because identities are multiplying. Machine identities outnumber humans by over 80 to 1, making them one of the fastest-growing risk classes in cloud-native environments. Unlike human accounts, NHIs rarely go through onboarding or offboarding, rely on static API keys or long-lived tokens, and are frequently overprivileged—the perfect storm for attackers.

IGA is about ensuring access is both appropriate, accountable, and, most importantly, auditable. To achieve these three pillars, IGA platforms bring together several capabilities.
Crucially, modern IGA extends these capabilities beyond human users to include NHIs, ensuring service accounts and automation agents undergo the same scrutiny as employees.

Identity management has grown into a set of overlapping disciplines, each with its own focus. Many people still use the terms interchangeably, but this approach can blur the lines between strategic governance and privileged account protection.
It’s helpful to understand exactly where each begins and ends. IAM is concerned with authentication and access control at the point of login. IGA adds oversight, certification, and auditability across all identities. To monitor and control their activity, privileged access management (PAM) narrows in on the riskiest accounts, such as administrators and root users. For example, organizations rely on PAM software to enforce controls around these sensitive accounts, ensuring that high-risk permissions are granted only when necessary and closely monitored.
| Discipline | Focus | Typical Scope | Key Purpose |
| IAM | Enforcement | Authentication, MFA, SSO | Prove identity and control access at login |
| IGA | Governance | Human and non-human identities | Define, review, and certify who should have access and why |
| PAM | Privilege | High-risk administrator and root accounts | Control and monitor privileged sessions |
In a cloud-native stack, thousands of containers, pods, and serverless functions may launch and terminate within minutes. Each instance often requires its own token or temporary credential to function. Legacy governance processes that rely on quarterly or monthly reviews cannot track this churn, so permissions are left unchecked. Security teams end up with audit trails that miss most of the short-lived identities, which makes proving compliance or investigating incidents almost impossible. A best practice to overcome this challenge is to use a cloud-native access management solution like Apono, which automates JIT access and generates granular audit logs, so even short-lived identities are governed in real time.
Cloud providers like AWS, Azure, and GCP offer permission systems with thousands of individual actions that can be combined into highly customized roles. Developers frequently over-provision roles because mapping business tasks to such granular entitlements is too time-consuming. Over time, these permission sprawl problems multiply, creating toxic combinations that static governance models don’t properly evaluate.
When engineers need access to a production database or a new cloud service, the request usually goes into a ticket queue. When reviews take too long, teams are forced to delay work or find workarounds such as borrowing credentials.
This bottleneck not only slows delivery but also weakens governance because security becomes seen as a blocker rather than a partner. In some organizations, administrators pre-approve broad entitlements “just in case.” This mistake undermines the entire principle of least privilege and increases the chance of compromised credentials being abused across environments.

Unmonitored NHIs are among the most consistent attack vectors in identity-driven breaches today. Service accounts and automation agents run critical workflows in CI/CD pipelines, monitoring systems, and infrastructure tools. These identities often carry long-lived credentials with powerful permissions. Unlike human users, they rarely leave the organization, so deprovisioning processes don’t catch them.
When one of these accounts is forgotten or left unmonitored, it becomes a permanent backdoor. Attackers frequently target exposed API keys or tokens for this reason, knowing they are less likely to be rotated or reviewed. As we’ve seen with emerging issues like the MCP protocol, unsecured machine-to-machine communications can further amplify the risks of unmanaged NHIs.
Recent examples include Microsoft’s 2023 SAS Token Leak, where researchers inadvertently published a token that exposed 38TB of internal data, and the BeyondTrust API Key Breach in 2024, where attackers exploited an overprivileged, static key to reset passwords and escalate privileges. Both incidents highlight how unmanaged non-human identities can open the door to large-scale compromise.
An essential NHI security best practice is to run a Cloud Access Assessment to uncover risks in your AWS environment, provided by Apono at no cost (for a limited time only). Apono’s platform is built to close this blind spot by enforcing JIT and JEP policies for NHIs just like human accounts, stopping long-lived keys from becoming backdoors.
Most enterprises work across multiple clouds, each with its own identity console and reporting format. Security teams trying to answer “who can access sensitive data” are forced to stitch together incomplete reports. The lack of a unified view leaves gaps for auditors and prevents real-time oversight—a challenge that becomes even more critical in industries like FinTech or government, which are subject to additional compliance requirements like CUI Basic.
Identity governance is moving from periodic checks to continuous oversight. Instead of leaving broad permissions in place and revisiting them months later, newer approaches shift towards:
By enforcing just-in-time access and contextual approvals, IGA reduces the standing permissions that often undermine API security in CI/CD pipelines and cloud workloads.

Cloud-native deployments and the explosion of non-human identities have pushed traditional identity governance past its limits. Static reviews and manual approvals leave too much standing access in environments where roles and permissions change constantly. To reduce risk, governance needs automation, time-bound access, and policies that apply equally to people and non-human accounts.
Apono redefines IGA for cloud-native teams. It eliminates risky standing permissions for both human and non-human identities, while ensuring compliance frameworks increasingly require full visibility into NHI governance. Apono’s platform automates JIT and JEP to eliminate standing permissions, generates granular audit logs for compliance, and applies governance equally to human and non-human identities. Approvals flow directly through Slack, Teams, or CLI—every action logged, every change auditable.
With built-in break-glass and on-call flows, and deployment in under 15 minutes, Apono delivers Zero Trust governance at the speed of modern infrastructure.
Ready to Eliminate Standing Access Risk?
Apono closes the gap by automating JIT and JEP for both human and non-human identities — stopping long-lived keys from becoming backdoors.Download The Security Leader’s Guide to Eliminating Standing Access Risk to see how leading cybersecurity companies are rethinking access control.
New details are emerging in recent weeks on how the Crimson Collective threat group has been conducting a large-scale campaign targeting Amazon Web Services cloud environments. Recent reports highlight how easily the attackers progressed once they obtained valid credentials.
The Crimson Collective claims to have exfiltrated ~570 GB across ~28,000 internal GitLab projects; Red Hat has confirmed access to a Consulting GitLab instance but hasn’t verified the full scope of those claims.
After the breach became public, Bleeping Computer reports that the threat actors partnered with headline-grabbing extortion group, Scattered Lapsus$ Hunters, to increase pressure on Red Hat.
In this post, we’ll break down how the hackers carried out their attack and how to keep your organization protected via a Zero Standing Privileges approach.
According to the report from Rapid 7 in Bleeping Computer, the attackers took a tried but true course of action to compromise their targets and make off with their illicitly obtained data.
This latest attack highlights a tough if not cliche truth in the cloud: attackers don’t need to break in if they can just log in. Once credentials with standing privileges are compromised, it gives them everything they need to move freely across environments.
The reality is that credential compromise is now a matter of when, not if. And as the number of Non-Human Identities (NHIs)—like service accounts, IAM roles, and API keys—continues to explode, the challenge keeps growing. In many organizations, NHIs now outnumber human users by roughly 200 to 1.
Things are getting even more complicated with the rise of Agentic AI tools. These systems operate at massive scale with unpredictable access needs, often without the visibility security teams rely on to monitor what’s actually being accessed.
Protecting against these kinds of attacks means focusing not just on preventing credential theft, but on minimizing what attackers can do after credentials are compromised. That’s why AWS told BleepingComputer that customers should “use short-term, least-privileged credentials and implement restrictive IAM policies.”
That advice perfectly captures the idea behind Zero Standing Privileges (ZSP), reducing the amount of always-on access available in your environment, so even if credentials are stolen, attackers have nowhere to go.
Of course, actually putting that into practice is the hard part. Manual access management is slow and painful, and cutting privileges too aggressively risks hurting productivity. And as cloud environments and NHIs multiply, keeping up manually just isn’t realistic anymore.
Apono makes it simple to put Zero Standing Privileges into action—without slowing anyone down.
Here’s how:
With Apono, security teams can close privilege gaps before attackers can exploit them, while developers and AI systems get access exactly when—and only when—they need it.
If you want a quick way to benchmark where standing privileges still exist in your environment, download our Zero Standing Privileges (ZSP) Checklist: a fast, practical self-assessment to help you identify hidden risks and early indicators of exposure.
Ready to take a smarter approach to cloud access?
See how Apono can help your organization prevent credential-based attacks while keeping teams fast and productive. Visit apono.io/jit-and-jep/ to learn more about our platform or request a demo.