When we talk about cybersecurity, we tend to focus on the perimeterâwhatâs outside, trying to get in.
But these days, thatâs not really how attacks work anymore.
In many of the ransomware cases weâve seen recently, attackers didnât âhackâ in. They just logged inâwith real credentials. No alarms. No brute force. Just unused access that was still active⊠and connected to everything.
And once theyâre in, access is the blast radius.
The Quiet Risk Hiding in Plain Sight
Most midsize manufacturing companies have dozens (if not hundreds) of accounts floating around their environment.
Some are personal logins. Some are service accounts. Some are old credentials left behind by vendors or former employees.
You end up with things like:
- đ A backup script with admin privileges
- đ DevOps keys reused across test and prod
- đł A staging bucket linked to a forgotten CI pipeline
- đŻ One engineer with access to production and the sandbox and the deployment tool
This stuff doesnât look dangerousâuntil it is. Because ransomware doesnât just lock your files. It follows access. And where your permissions lead, it goes.
IAM Should Be a Strategic Layer, Not Just IT Hygiene
In most orgs, identity and access management (IAM) is treated like back-office plumbing.
Necessary, but not critical.
That made sense when systems were slower-moving, and most access was local.
But now weâre operating in hybrid environmentsâcloud-connected, integrated across multiple vendors and internal tools. IAM is no longer a back-office problem. Itâs the front line.
Because weâre not just talking about who can log into email. Weâre talking about:
- đ Who can spin up infrastructure in AWS or Azure
- đ Who can deploy new builds to the factory floor
- đ Who can change configurations in your CI/CD pipeline
- đ And what access automatically propagates across environments (whether you meant to or not)
Four IAM Gaps We See All the Time
None of these are unusual. In fact, theyâre common. But theyâre also easy to fixâif youâre looking for them:
- â
Too much access â service accounts or users with broad, unnecessary privileges
- đ Stale credentials â contractors, vendors, or test users that were never deactivated
- đ« Shared admin accounts â no visibility, no accountability
- đ Privilege escalation â no controls in place to stop someone from quietly gaining more access
These arenât abstract issues. Theyâre usually hiding in your config files and IAM dashboards right now.
IAM Needs to Touch More Than Just IT
If youâre serious about ransomware resilience, you canât silo IAM to the IT department.
It needs to extend to:
- Your infrastructure: cloud platforms, log systems, Kubernetes clusters
- Your product environments: build servers, staging areas, sandbox APIs
- Your factory-adjacent systems: MES, ERP access, monitoring tools
If a compromised key can access all three?
Thatâs where a small breach becomes a company-wide crisis.
So Where Do You Start?
You donât need to rip everything out and start over. A few small moves go a long way:
- đ Apply least privilegeâgive access based on actual need, not whatâs easiest
- đ Audit and remove dormant users and accounts
- đ« Block unchecked privilege escalation
- đ Separate test/staging/prod environments at the access levelânot just by folder
- đ Add visibility: who has access to what, and what that access really means
đ„ Want a Shortcut?
We put together an IAM Misconfiguration Risk Checklist for midsize product and infrastructure teamsâespecially in industrial environments.
Itâs built on real-world breaches weâve studied and helped teams recover from.