Identity Is Not Enough: Why Every Major Breach Had Valid Credentials
Roshan ShaikMay 9, 202614 min read
Every major breach of the last three years has one thing in common. The attacker was authenticated. They had a valid session, a legitimate OAuth token, stolen-but-real credentials, or a non-human identity credential that every downstream system accepted without question.
Okta's support service account was compromised — and the attacker used it to steal session tokens from every HAR file customers had ever uploaded. Snowflake lost 160+ enterprise customers to attackers who simply logged in. ADT was vished twice in 18 months through its Okta help desk — same vector, same outcome, different year. And in August 2025, a single compromised OAuth integration token gave one threat actor authenticated API access to 700 enterprise Salesforce tenants simultaneously — without ever touching a human credential.
In none of these cases did the attacker break cryptography or brute-force anything in real time. In every case, by the time data began moving, the attacker had a credential — human or non-human — that every layer of identity infrastructure said was legitimate.
This is the identity paradox. And it applies equally to human identities and the non-human identities — API tokens, OAuth integrations, CI/CD credentials, service accounts — that now outnumber human accounts in most enterprises by orders of magnitude.
10/10
Breaches where attacker had valid auth credentials or token
0/10
Breaches stopped by identity layer alone
3.5TB
Data Canvas/Salesforce couldn't detect moving with a valid session
$117.5M
Comcast settlement — 35.9M customers, one unpatched Citrix box
The Breach Record: Valid Identity, Every Time
We analyzed ten of the most significant breaches of the last three years — spanning the world's largest identity providers, SaaS platforms, enterprise security companies, and AI infrastructure. Seven involve human identities. Three involve non-human identities (NHI) — API tokens, OAuth integrations, and service accounts. The pattern across both is consistent and sobering.
Identity provider: Institutional SSO (Shibboleth, Azure AD, Google) + Free-For-Teacher self-enrollment · MFA: Not enforced on FFT tier · May 2026
Instructure operates two account tiers on the same production infrastructure: institutionally-managed accounts (SSO via university IdPs) and a Free-For-Teacher self-enrollment program (no institutional IdP, no verification). ShinyHunters exploited the weaker tier — self-enrolled FFT accounts that shared production tenant access — to exfiltrate 3.65TB across 8,809 institutions over a 7-day window. The second breach occurred one week after the first, using the same vector.
This is Salesforce's problem. The platform — one of the world's largest SaaS systems by data volume — was completely blind to 3.65TB leaving its infrastructure. No exfiltration monitoring. No volume threshold. No anomaly detection. A valid session moved the equivalent of hundreds of millions of records and nothing fired.
Missing After Authentication
Egress volume monitoring — 3.65TB is not a subtle signal. API rate limiting by data volume, not just request count. Tenant isolation enforcement between account tiers. Behavioral baseline per account — FFT accounts running bulk exports of production data is anomalous by definition.
Vercel — OAuth Token Theft via Shadow AI App
High · AI Supply Chain Attack
Identity provider: Google Workspace OAuth 2.0 · MFA: Bypassed by direct token theft · April 2026
A Vercel employee signed up for Context AI (an "AI Office Suite") using their corporate Google Workspace account with "Allow All" OAuth permissions. Context AI was later compromised via Lumma Stealer malware delivered through malicious Roblox scripts — a consumer-facing attack surface that harvested corporate OAuth tokens as a secondary effect. With the Vercel employee's Google OAuth token, the attacker accessed Vercel's internal environments and unclassified environment variables.
This is the AI-era attack surface. Consumer AI tools, personal devices, over-scoped OAuth grants, and zero enforcement of corporate app policies on third-party AI apps create a new credential exfiltration vector that traditional identity governance doesn't see.
Missing After Authentication
Shadow IT visibility — the AI tool was unsanctioned but used with corporate credentials. OAuth scope enforcement — "Allow All" should not be permissible for corporate accounts. Token anomaly detection — new IP/location using an existing valid OAuth token.
Identity type: PyPI API token (non-human CI/CD identity — not a human login) · MFA: N/A for machine tokens · March 2026
This is not a human identity breach. The target was a non-human identity — LiteLLM's PyPI publishing API token stored in its CI/CD pipeline. A poisoned version of Trivy (a security scanning tool used in the build pipeline) exfiltrated the token to attacker group TeamPCP. With valid PyPI credentials, TeamPCP published two malicious versions of litellm (1.82.7 and 1.82.8) in a 13-minute window. The malicious payload harvested SSH keys, cloud credentials (GCP, AWS, Azure), kubeconfigs, API keys, and database passwords from every machine that installed either version.
This breach illustrates why non-human identity — API tokens, service accounts, CI/CD credentials — is the largest unmonitored attack surface in modern infrastructure. No MFA applies. No rotation policy existed. The scanning tool exfiltrated the very secret it was supposed to protect.
Missing After Authentication
Short-lived, scoped tokens for pipeline publishing — not long-lived API keys. Detection of CI/CD tooling making outbound connections to attacker infrastructure. Anomaly detection on package publishing activity. NHI inventory — the token was unmonitored because it wasn't tracked as an identity at all.
ADT — AI-Assisted Vishing, Round Two. 5.5M Customers.
High · 5.5M Customer Records
ShinyHunters (UNC6040) returned to ADT with the same playbook as 2024 — vishing targeting the Okta help desk — but with AI-generated call scripts that made impersonation more convincing and harder to detect in real time. The attacker again obtained a valid Okta session and pivoted to Salesforce. 5.5M customer records including names, addresses, dates of birth, and partial SSNs were confirmed in Have I Been Pwned. ShinyHunters claimed 10M+ Salesforce records.
This is the third ADT breach in 18 months. The attack vector — vishing → help desk reset → valid Okta session → Salesforce data — was identical to the 2024 incident. The 2024 breach produced no process changes sufficient to stop the 2025 attack. Same company. Same attacker group. Same entry point.
Missing After Authentication
Out-of-band callback verification for all help desk credential resets — call the employee back on their registered device, not the caller's number. Behavioral monitoring on Salesforce sessions from newly-reset accounts. The identity layer was not the problem in 2024 or 2025. The process that overrides it was.
This is not a human identity breach. Threat actor UNC6395 compromised Salesloft Drift's OAuth integration credentials and used valid non-human identity tokens to authenticate directly into 700+ Salesforce customer organizations — without ever touching a human credential or MFA prompt. OAuth tokens are post-authentication artifacts: they are issued after MFA completes and grant API access without re-challenging MFA for each call.
UNC6395 ran SOQL queries across all 700 tenants, harvesting user credentials, opportunity data, and customer records — and then searched within those records for embedded AWS access keys, Snowflake tokens, and other cloud credentials. Drift was removed from the Salesforce AppExchange. All active Drift OAuth tokens were revoked August 20. The Salesforce identity layer — OAuth — did exactly what it was designed to do: it trusted the token.
Missing After Authentication
Third-party OAuth app behavioral monitoring — the integration was making anomalous API calls across hundreds of tenants simultaneously, which is not normal behavior for a sales engagement tool. OAuth scope minimization — "full access" grants to third-party integrations. Detection of NHI token usage from unexpected infrastructure.
ADT — Okta Bypassed via Help Desk, Salesforce as Data Tier
High · First of Three Breaches in 18 Months
Identity provider: Okta SSO → Salesforce · MFA: Bypassed via account reset · August 2024
ShinyHunters (UNC6040) breached ADT's Okta environment using vishing — impersonating an employee to manipulate an Okta help desk reset. The valid Okta session was then used to pivot to ADT's Salesforce instance to exfiltrate customer records. This is the same playbook ShinyHunters used across Instructure, Workday, McGraw-Hill, Amtrak, and Infinite Campus — with minor variations. The pattern is consistent enough that Mandiant has documented it as UNC6040's standard operating procedure.
Missing After Authentication
Out-of-band callback verification for help desk account resets. Behavioral monitoring on Salesforce API sessions — bulk queries from newly-reset accounts with no prior data access history. Least-privilege scoping on third-party vendor access.
Snowflake — 160+ Enterprise Customers, 560M+ Records
Critical
UNC5537 didn't exploit a vulnerability. They logged in. Infostealers (VIDAR, RISEPRO, LummaC2) had harvested Snowflake credentials from employee devices over years — some dating to 2020. UNC5537 bought the credentials on criminal marketplaces, authenticated normally through Snowflake's login page, and ran bulk SELECT queries exporting tens of millions of records. Victims included AT&T (110M records), Ticketmaster (560M records), Santander Bank, LendingTree, and 155 others.
What stopped it: Nothing. Snowflake did not enforce MFA globally at the time — it was opt-in. No alerting existed on bulk data exports from accounts that had never previously exported anything. Snowflake's event logging was a paid add-on that most affected customers hadn't enabled.
Missing After Authentication
Behavioral anomaly detection — an account that has never run a bulk export query suddenly exporting 100M rows is an obvious signal. No egress volume thresholds. No alerting on logins from IPs with no history on the account.
Microsoft / Midnight Blizzard — No MFA on a Legacy Test Tenant. Russian SVR Gets In.
Critical · State Actor (APT29)
Identity provider: Legacy Microsoft OAuth test tenant (no production SSO) · MFA: Not enabled · January 2024
APT29 (Cozy Bear — Russian SVR, the SolarWinds group) used password spray against a legacy, non-production OAuth test tenant that had no MFA enabled. The test account had been granted dangerously elevated OAuth permissions: Directory.ReadWrite.All, RoleManagement.ReadWrite.Directory, Application.ReadWrite.All. APT29 used those permissions to create new OAuth applications, grant Exchange Online full_access_as_app, and pivot into Microsoft's corporate email — accessing accounts of senior leadership, the cybersecurity team, and legal employees. They were specifically looking for what Microsoft knew about APT29.
Microsoft filed with the SEC under new cyber disclosure rules. CISA issued a federal alert. Attack volume escalated 10× in February 2024. The entry point: a forgotten test account with no MFA that no one had decommissioned.
Missing After Authentication
Lifecycle management for non-production accounts — the test tenant should not have existed with those permissions. MFA enforcement on all accounts regardless of environment. Least-privilege review on OAuth app permissions. Detection of password spray against legacy tenants with no recent activity.
Okta — The Identity Provider Gets Its Own Session Hijacked
High · 5 Enterprise Customers AffectedNHI Breach
Identity type: Okta internal service account (non-human identity — Salesforce support portal) · MFA: Bypassed by token replay · October 2023
This breach began with a non-human identity — a Salesforce support service account whose credentials an Okta employee had saved to their personal Chrome profile, which synced to a personal device. That device was compromised. The attacker accessed Okta's customer support portal and downloaded HAR files customers had uploaded for troubleshooting. HAR files contain raw browser session data — including active session cookies and authentication tokens in plaintext. The attacker replayed those tokens against 5 Okta customers, including BeyondTrust, Cloudflare, and 1Password.
The deepest irony in modern security: the world's largest enterprise identity provider was breached via its own support service account, and the credentials to sensitive customer data were exfiltrated in a file format that customers themselves had uploaded for support purposes.
Missing After Authentication
Controls prohibiting credential sync to personal browser profiles. Detection of the service account accessing an anomalous number of customer files. HAR sanitization — tooling to strip session tokens before upload. Session token lifetime limits that would have expired replayed tokens before use.
Comcast / Xfinity — CitrixBleed: MFA Bypassed Before It Could Apply
Critical · 35.9M Records · $117.5M Settlement (2026)
Identity provider: Citrix NetScaler (session gateway) · MFA: Fully bypassed by session token extraction · October 2023 · Settlement finalized April 2026
CVE-2023-4966, "CitrixBleed," allowed attackers to extract valid authenticated session tokens directly from Citrix NetScaler ADC memory — no credentials required. The attack delivered a live, authenticated session that had already passed MFA. The attacker never touched the authentication step. Comcast was attacked between October 16–19, 2023, days after Citrix published the patch but before Comcast applied it. 35.9M customer records exposed — including hashed passwords, partial SSNs, and secret Q&A responses.
In April 2026, Comcast agreed to a $117.5M class action settlement — one of the largest data breach settlements on record. The final approval hearing is scheduled for July 7, 2026. The breach itself took four days. The recovery took three years.
Missing After Authentication
Detection of session replay from IPs with no prior history. Behavioral monitoring post-authentication — the stolen session initiated access patterns inconsistent with the original user's behavior. Patch cadence controls — the vulnerability was public when the breach occurred.
The Pattern in Every Breach
Across all ten breaches, three consistent themes emerge.
1. Authentication Succeeded — Human and Non-Human
In zero cases did the attacker break cryptography or brute-force credentials in real time. For human identities: they obtained valid credentials (stolen, reset, or social-engineered), stole valid session tokens (post-authentication), or exploited the human override mechanism (help desk reset). For non-human identities: they stole API tokens, OAuth integration credentials, or service account credentials — none of which have MFA equivalents. In every case, the authentication system did exactly what it was designed to do.
2. MFA Was Present but Insufficient
Of the ten breaches: MFA was present in six. In all six, it was bypassed — not broken. Social engineering bypassed help desk reset procedures. Session token theft delivered pre-authenticated sessions. OAuth token exfiltration made MFA irrelevant — OAuth tokens are post-MFA artifacts. Three breaches had no MFA at all (Canvas FFT, Snowflake, Microsoft's test tenant). Three were NHI breaches where MFA doesn't apply. MFA is a gate at the front door. It provides zero protection once the attacker is inside — and zero protection for non-human identities that have no door at all.
3. The Data Layer Was Unprotected
After authentication succeeded, in every case the data layer had no independent controls. No behavioral anomaly detection on query volume. No egress monitoring on data transfer rates. No tenant-level key isolation. No immutable audit trail that would have detected the exfiltration before it completed. The posture was: if you authenticated, you're trusted. Trust means access. Access means data.
The verdict across 10 breaches — most recent first
Breach & Date
Identity Type
MFA Present
How Auth Was Defeated
What Attacker Had
Canvas / Instructure May 2026
Human · Instructure native auth (FFT tier)
No (FFT tier)
Unverified self-enrollment tier exploited
Valid FFT account credentials
Vercel Apr 2026
Human · Google Workspace OAuth 2.0
Yes
OAuth token stolen via Lumma Stealer / shadow AI app
UNC5537 didn't exploit a vulnerability. They logged in. Infostealers (VIDAR, RISEPRO, LummaC2) had harvested Snowflake credentials from employee devices over years — some dating to 2020. UNC5537 bought the credentials on criminal marketplaces, authenticated normally through Snowflake's login page, and ran bulk SELECT queries exporting tens of millions of records. Victims included AT&T (110M records), Ticketmaster (560M records), Santander Bank, LendingTree, and 155 others.
What stopped it: Nothing. Snowflake did not enforce MFA globally at the time — it was opt-in. No alerting existed on bulk data exports from accounts that had never previously exported anything. Snowflake's event logging was a paid add-on that most affected customers hadn't enabled.
Missing After Authentication
Behavioral anomaly detection — an account that has never run a bulk export query suddenly exporting 100M rows is an obvious signal. No egress volume thresholds. No alerting on logins from IPs with no history on the account.
Identity provider: Okta SSO + Azure AD · MFA: Present, bypassed via help desk · 2023
Scattered Spider researched an MGM employee on LinkedIn, called MGM's IT help desk impersonating that employee, and in ten minutes had convinced the help desk to reset the account credentials. They then escalated to Okta SuperAdmin — effectively owning MGM's entire identity estate: VPNs, Azure tenant, ESXi hypervisors, and every Okta-federated application. ALPHV ransomware was deployed to 100+ ESXi hosts before MGM detected the intrusion.
The MFA question: MFA was present. It was irrelevant. The help desk reset the account before MFA was a factor, issuing fresh credentials to the attacker who had successfully impersonated the employee. The technical identity controls were sound. The human process that could override them was not.
Missing After Authentication
A newly-reset account immediately requesting SuperAdmin privileges is anomalous by definition. No behavioral controls flagged the escalation. The blast radius of a single compromised admin account was the entire enterprise — Okta SuperAdmin scoping was never constrained to least privilege.
Microsoft / Storm-0558 — Forged Tokens, Global Scope
Critical · State Actor
Identity provider: Microsoft MSA signing infrastructure + Entra ID · 2023
Storm-0558, a Chinese state-sponsored group, exploited a cascade of operational failures to extract Microsoft's private MSA token signing key from a crash dump that had migrated from isolated production signing infrastructure to Microsoft's corporate debugging environment. With the signing key, they forged OAuth access tokens that every Microsoft service — Outlook, SharePoint, OneDrive, Teams — accepted as valid. The CSRB called it "preventable" and cited "inadequate security culture."
Critically: Azure AD's validation SDK didn't verify whether a token was signed by a consumer MSA key vs. an enterprise Entra key. The forged token had perfect cryptographic validity. No authentication system in the chain rejected it. Wiz Research found the key could have forged valid tokens for far more Microsoft services than initially disclosed.
Missing After Authentication
Signing key isolation from corporate networks. Crash dump scrubbing for sensitive material before leaving production environments. Cross-tenant audit logging (free for all customers, not a paid add-on). Token issuer validation — the SDK trusted the signature without verifying the key type.
Okta — The Identity Provider Gets Its Own Session Hijacked
High · 5 Enterprise Customers Affected
An Okta employee saved the credentials to a Salesforce support service account in their personal Chrome profile, which synced to a personal device. That device was compromised. The attacker accessed Okta's customer support portal and downloaded HAR files customers had uploaded for troubleshooting. HAR files contain raw browser session data — including active session cookies and authentication tokens in plaintext. The attacker replayed those tokens against 5 Okta customers, including BeyondTrust, Cloudflare, and 1Password.
The deepest irony in modern security: the world's largest enterprise identity provider was breached via its own support service account, and the credentials to sensitive customer data were exfiltrated in a file format that customers themselves had uploaded for support purposes.
Missing After Authentication
Controls prohibiting credential sync to personal browser profiles. Detection of the service account accessing an anomalous number of customer files. HAR sanitization — tooling to strip session tokens before upload. Session token lifetime limits that would have expired replayed tokens before use.
ADT — Okta Bypassed via Help Desk, Salesforce as Data Tier
High · 5.5M Customer Records
ShinyHunters (UNC6040) breached ADT's Okta environment using vishing — impersonating an employee to manipulate an Okta help desk reset. The valid Okta session was then used to pivot to ADT's Salesforce instance to exfiltrate customer records. This is the same playbook ShinyHunters used across Instructure, Workday, McGraw-Hill, Amtrak, and Infinite Campus — with minor variations. The pattern is consistent enough that Mandiant has documented it as UNC6040's standard operating procedure.
Missing After Authentication
Out-of-band callback verification for help desk account resets. Behavioral monitoring on Salesforce API sessions — bulk queries from newly-reset accounts with no prior data access history. Least-privilege scoping on third-party vendor access.
Identity provider: Institutional SSO (Shibboleth, Azure AD, Google) + Free-For-Teacher self-enrollment · MFA: Not enforced on FFT tier · 2026
Instructure operates two account tiers on the same production infrastructure: institutionally-managed accounts (SSO via university IdPs) and a Free-For-Teacher self-enrollment program (no institutional IdP, no verification). ShinyHunters exploited the weaker tier — self-enrolled FFT accounts that shared production tenant access — to exfiltrate 3.65TB across 8,809 institutions over a 7-day window. The second breach occurred one week after the first, using the same vector.
This is Salesforce's problem. The platform — one of the world's largest SaaS systems by data volume — was completely blind to 3.65TB leaving its infrastructure. No exfiltration monitoring. No volume threshold. No anomaly detection. A valid session moved the equivalent of hundreds of millions of records and nothing fired. Not a misconfiguration. An architectural gap at the vendor level that every customer inherited without knowing it.
Missing After Authentication
Egress volume monitoring — 3.65TB is not a subtle signal. API rate limiting by data volume, not just request count. Tenant isolation enforcement between account tiers. Behavioral baseline per account — FFT accounts that have never queried production data suddenly running bulk exports is anomalous by definition.
Comcast / Xfinity — CitrixBleed: MFA Bypassed Before It Could Apply
Critical · 35.9M Records
CVE-2023-4966, "CitrixBleed," allowed attackers to extract valid authenticated session tokens directly from Citrix NetScaler ADC memory — no credentials required. The attack delivered a live, authenticated session that had already passed MFA. The attacker never touched the authentication step. Comcast was attacked between October 16–19, 2023, days after Citrix published the patch but before Comcast applied it. 35.9M customer records exposed — including hashed passwords, partial SSNs, and secret Q&A responses.
Missing After Authentication
Detection of session replay from IPs with no prior history. Behavioral monitoring post-authentication — the stolen session initiated access patterns inconsistent with the original user's behavior. Patch cadence controls — the vulnerability was public when the breach occurred.
Vercel — OAuth Token Theft via Shadow AI App
High · AI Supply Chain Attack
Identity provider: Google Workspace OAuth 2.0 · MFA: Bypassed by direct token theft · 2026
A Vercel employee signed up for Context AI (an "AI Office Suite") using their corporate Google Workspace account with "Allow All" OAuth permissions. Context AI was later compromised via Lumma Stealer malware delivered through malicious Roblox scripts — a consumer-facing attack surface that harvested corporate OAuth tokens as a secondary effect. With the Vercel employee's Google OAuth token, the attacker accessed Vercel's internal environments and unclassified environment variables.
This is the AI-era attack surface. Consumer AI tools, personal devices, over-scoped OAuth grants, and zero enforcement of corporate app policies on third-party AI apps create a new credential exfiltration vector that traditional identity governance doesn't see.
Missing After Authentication
Shadow IT visibility — the AI tool was unsanctioned but used with corporate credentials. OAuth scope enforcement — "Allow All" should not be permissible for corporate accounts. Token anomaly detection — new IP/location using an existing valid OAuth token. Environment variable classification — unclassified secrets were accessible to a compromised OAuth session.
Identity provider: PyPI API token (non-human identity) · MFA: N/A · March 2026
The attack targeted a non-human identity — LiteLLM's PyPI publishing API token stored in its CI/CD pipeline. A poisoned version of Trivy (a security scanning tool used in the build pipeline) exfiltrated the token to attacker group TeamPCP. With valid PyPI credentials, TeamPCP published two malicious versions of litellm (1.82.7 and 1.82.8) in a 13-minute window. The malicious payload — a .pth file that executes on every Python startup — harvested SSH keys, cloud credentials (GCP, AWS, Azure), kubeconfigs, API keys, and database passwords from every machine that installed either version.
This breach illustrates why non-human identity — API tokens, service accounts, CI/CD credentials — is the largest unmonitored attack surface in modern infrastructure. No MFA. No rotation policy. No detection of the scanning tool exfiltrating the secret it was supposed to protect.
Missing After Authentication
Long-lived CI/CD secrets are the vulnerability. Short-lived, scoped tokens for pipeline publishing. Detection of CI/CD tooling exfiltrating secrets — the scanner should not be making outbound connections to attacker infrastructure. Anomaly detection on what packages are published and from where.
The Pattern in Every Breach
Across all ten breaches, three consistent themes emerge.
1. Authentication Succeeded
In zero cases did the attacker break cryptography, brute-force credentials in real time, or exploit a fundamental flaw in the identity protocol itself. In every case they either obtained a valid credential (stolen, reset, or forged), stole a valid session token (post-authentication), or social-engineered the human override mechanism (help desk reset). The authentication system did exactly what it was designed to do — it trusted what it was given.
2. MFA Was Present but Insufficient
Of the nine breaches: MFA was present in at least seven. In every one of those seven, it was bypassed — not broken. Social engineering bypassed help desk reset procedures. Session token theft delivered pre-authenticated sessions. OAuth token exfiltration made MFA irrelevant. A forged signing key produced tokens that passed every cryptographic check. MFA is a gate at the front door. It provides zero protection once the attacker is inside.
3. The Data Layer Was Unprotected
After authentication succeeded, in every case the data layer had no independent controls. No behavioral anomaly detection on query volume. No egress monitoring on data transfer rates. No tenant-level key isolation that would have made exfiltrated records useless. No immutable audit trail that would have detected the exfiltration before it completed. The posture was: if you authenticated, you're trusted. Trust means access. Access means data.
The verdict across 10 breaches — most recent first
Breach & Date
Identity Provider
MFA Present
How Auth Was Defeated
What Attacker Had
Canvas / Instructure May 2026
Instructure native auth (FFT tier) Institutional accounts use university SAML IdPs — not Okta
No (FFT tier)
Unverified self-enrollment tier exploited
Valid FFT account credentials
Vercel Apr 19, 2026
Google Workspace OAuth 2.0
Yes
OAuth token stolen via Lumma Stealer through shadow AI app
Why This Is an Existential Problem for AI Security
Every issue described above existed before AI agents entered enterprise infrastructure. With agents, each failure mode becomes orders of magnitude more dangerous.
Scale. A human attacker with a valid session can manually query data — which creates behavioral signals (unusual query volume, anomalous hours, new data types accessed). An AI agent with a valid session can run 10,000 API calls in the time a human runs ten. The behavioral baseline breaks down at agent scale.
Persistence. Agents run continuously, often unattended, with no human in the loop. A compromised agent doesn't trigger the fatigue signals a human attacker does. It runs the same malicious task on a loop until something stops it — and in most enterprise environments, nothing is watching for that.
Breadth of access. To be useful, AI agents are granted access across systems — CRM, ERP, code repositories, communication platforms, data warehouses. The same "God-mode access" that makes agents powerful is what makes a single compromised agent a catastrophic blast radius. One valid token, one exfiltration workflow, and the agent touches everything it was ever granted access to.
Non-human identity gap. LiteLLM illustrates this precisely. The PyPI API token was a non-human identity — no MFA, no rotation policy, no monitoring. As enterprises deploy more AI agents, service accounts, CI/CD pipelines, and automated workflows, the non-human identity attack surface expands exponentially with no equivalent expansion of controls.
The identity paradox for AI agents: The broader the access an agent has, the more useful it is — and the more catastrophic a valid credential becomes in the wrong hands. Identity alone cannot solve this. The control layer has to sit in the execution path, not at the gate.
What the Missing Control Layer Looks Like
In every breach, the failure wasn't authentication. It was the absence of controls that answer four questions that identity cannot:
Is this authorized? — not just "is this identity valid" but "is this specific action within the authorized scope of what this identity is permitted to do right now?" An Okta SuperAdmin session is legitimate. An Okta SuperAdmin session that immediately requests 47 privilege escalations after a credential reset is not.
Is this normal? — behavioral governance that maintains a baseline per identity and flags deviations. A Snowflake account that has never run a bulk export query running one that returns 100M rows is not normal. A Salesforce session that transfers 3.5TB when no prior session has ever transferred more than 50MB is not normal.
Is this authorized to leave? — egress controls at the data layer, not just the network layer. Encryption at rest with tenant-level key isolation means that exfiltrated records are useless ciphertext. Data that can't be read outside the tenant boundary can be stolen without consequence.
Can we reconstruct what happened? — an immutable audit trail that captures every action, every access, every data movement in a tamper-proof record. Not for compliance theater — for the ability to stop an incident mid-stream when behavioral controls detect an anomaly.
These four controls don't compete with identity. They operate after it — at the layer where identity's trust boundary ends and data access begins. That's the layer that stopped none of the ten breaches above. For NHI breaches, the problem is even starker: non-human identities often have no identity layer at all — just a long-lived token with no rotation, no monitoring, and no revocation workflow until after the breach.
RuntimeAI How We Approach This
RuntimeAI's control plane is built around the insight that identity is a necessary but insufficient condition for security. Our platform operates after authentication — at the agent execution layer and the data access layer — answering the four questions that identity cannot.
KYA (Know Your Agent): Every AI agent is registered, fingerprinted, and scoped at deployment. What systems can it access? What actions is it authorized to take? What data classifications can it touch? The authorized scope is enforced at runtime, not assumed from the identity credential.
Behavioral Anomaly Detection: We maintain baselines per agent and per identity — query volume, API call patterns, data access types, geographic origin. Deviations are flagged and, where configured, blocked in real time. An agent that normally calls 3 APIs and suddenly calls 3,000 is detected at the behavioral layer before data moves.
PQData — Data-Layer Encryption and Egress Control: PII Shield tokenizes sensitive fields at write time. PQ TokenVault enforces format-preserving encryption with tenant-level key isolation. PQ Transit Shield enforces egress policy — outbound transfers to destinations not in the approved list are blocked at the network layer, not the application layer. 3.5TB doesn't move silently if these controls are in place.
Audit Black Box: Every action is cryptographically chained in an immutable audit trail — tamper-proof, court-admissible, available for real-time behavioral analysis. The audit trail is what enables behavioral controls to work: you can only detect deviation from baseline if you have a baseline.
Session-Level Kill Switch: When behavioral controls detect an anomaly — bulk read spike, anomalous egress, access to unauthorized data classification — the agent session is quarantined in real time. The attacker has a valid credential. They lose the session before the data leaves.
Identity tells you who is at the door. RuntimeAI governs what they do once they're inside.
See the Control Layer in Action
Every breach above was preventable with controls at the data and behavior layer. Start a free trial and see how RuntimeAI applies these controls to your AI agent environment.