When we talk about cybersecurity, we tend to focus on the perimeterāwhatās outside, trying to get in.
But these days, thatās not really how attacks work anymore.
In many of the ransomware cases weāve seen recently, attackers didnāt āhackā in. They just logged ināwith real credentials. No alarms. No brute force. Just unused access that was still active⦠and connected to everything.
And once theyāre in, access is the blast radius.
The Quiet Risk Hiding in Plain Sight
Most midsize manufacturing companies have dozens (if not hundreds) of accounts floating around their environment.
Some are personal logins. Some are service accounts. Some are old credentials left behind by vendors or former employees.
You end up with things like:
- š A backup script with admin privileges
- š DevOps keys reused across test and prod
- š³ A staging bucket linked to a forgotten CI pipeline
- šÆ One engineer with access to production and the sandbox and the deployment tool
This stuff doesnāt look dangerousāuntil it is. Because ransomware doesnāt just lock your files. It follows access. And where your permissions lead, it goes.
IAM Should Be a Strategic Layer, Not Just IT Hygiene
In most orgs, identity and access management (IAM) is treated like back-office plumbing.
Necessary, but not critical.
That made sense when systems were slower-moving, and most access was local.
But now weāre operating in hybrid environmentsācloud-connected, integrated across multiple vendors and internal tools. IAM is no longer a back-office problem. Itās the front line.
Because weāre not just talking about who can log into email. Weāre talking about:
- š Who can spin up infrastructure in AWS or Azure
- š Who can deploy new builds to the factory floor
- š Who can change configurations in your CI/CD pipeline
- š And what access automatically propagates across environments (whether you meant to or not)
Four IAM Gaps We See All the Time
None of these are unusual. In fact, theyāre common. But theyāre also easy to fixāif youāre looking for them:
- ā
Too much access ā service accounts or users with broad, unnecessary privileges
- š Stale credentials ā contractors, vendors, or test users that were never deactivated
- š« Shared admin accounts ā no visibility, no accountability
- š Privilege escalation ā no controls in place to stop someone from quietly gaining more access
These arenāt abstract issues. Theyāre usually hiding in your config files and IAM dashboards right now.
IAM Needs to Touch More Than Just IT
If youāre serious about ransomware resilience, you canāt silo IAM to the IT department.
It needs to extend to:
- Your infrastructure: cloud platforms, log systems, Kubernetes clusters
- Your product environments: build servers, staging areas, sandbox APIs
- Your factory-adjacent systems: MES, ERP access, monitoring tools
If a compromised key can access all three?
Thatās where a small breach becomes a company-wide crisis.
So Where Do You Start?
You donāt need to rip everything out and start over. A few small moves go a long way:
- š Apply least privilegeāgive access based on actual need, not whatās easiest
- š Audit and remove dormant users and accounts
- š« Block unchecked privilege escalation
- š Separate test/staging/prod environments at the access levelānot just by folder
- š Add visibility: who has access to what, and what that access really means
š„ Want a Shortcut?
We put together an IAM Misconfiguration Risk Checklist for midsize product and infrastructure teamsāespecially in industrial environments.
Itās built on real-world breaches weāve studied and helped teams recover from.