A new report from Netwrix highlights a critical shift in the cybersecurity landscape: the convergence of identity and data security. The report predicts that future cyberattacks will increasingly target the seams between these two traditionally separate domains. As organizations adopt complex, automated workflows to govern access to data, adversaries are moving beyond simple credential theft. Instead, they are focusing on exploiting misconfigurations in identity orchestration, federation trusts, and automation logic itself. The rise of agentic AI, where non-human entities can autonomously access and manipulate data, will amplify this threat. The report argues that achieving unified visibility across both identity and data security is no longer optional but essential for defending against this next generation of attacks.
The report, based on research into real-world identity attacks, outlines several forward-looking predictions:
The convergence of identity and data security creates novel and complex risks for organizations:
The report stresses that siloed security tools are inadequate for this new threat landscape.
M1018 - User Account Management.Implement strong identity governance to regularly review and certify access rights, especially those granted through complex automation.
Apply the principle of least privilege to all identities, including non-human AI agents, to limit their access to only what is necessary.
To address the risks of identity and data security convergence, organizations must move beyond managing individual permissions and focus on governing 'effective access'. This requires tools that can analyze the complex chain of permissions from groups, roles, and automation workflows to determine what data a user can actually access. Security teams should conduct regular 'effective access reviews' for sensitive data stores. This process should automatically identify and flag accounts—especially non-human ones like AI agents or service principals—that have excessive or unnecessary permissions. By focusing on the end result of the identity orchestration process, organizations can close the security gaps that attackers are predicted to exploit.
Attackers are targeting the trust relationships between identity systems. Security teams must harden these connections. For hybrid environments, this means scrutinizing the configuration of AD Connect and ensuring that cloud accounts cannot be easily used to compromise on-premises Active Directory, and vice-versa. For federated identity, review the trust settings with all external identity providers, ensuring that only necessary claims are accepted and that strong authentication is required. By hardening these domain trust policies, organizations can prevent attackers from abusing legitimate federation and synchronization mechanisms to escalate privileges.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats