
Identity security company CyberArk has released its 2025 State of Machine Identity Report. It reveals that machine identity-related security incidents are on the rise as the volume and complexity of machine identities continue to multiply.
The report found that while the majority of Australian organisations have some form of machine identity security program, many are still immature, with less than half having a dedicated program (13% below the global average) and nearly half of Australian security leaders reporting security incidents or breaches caused by compromised machine identities.
Additionally, 69% of Australian organisations have experienced at least one certificate-related outage in the past year, with nearly half suffering significant business impact due to an expired TLS certificate.
Machine identities, including certificates, keys, secrets and access tokens, are exploding amid the rise of artificial intelligence adoption, cloud native innovations and shorter machine identity lifespans. As a result, organisations are struggling to keep up and siloed approaches to securing machine identities create its own risks. The report shows the substantial business impacts of not securing machine identities effectively, leaving organisations vulnerable to costly outages and breaches.
“As Australian organisations accelerate digitalisation, automation and AI adoption, the growth and complexity of machine identities make securing them critical,” said CyberArk Area VP Thomas Fikentscher. “Expired certificates and compromised machine identities are not just technical issues. They have real business impact, from application downtime to unauthorised access. To address these challenges, organisations must move beyond fragmented approaches and establish a unified machine identity security strategy in order to get full transparency and be able to effectively mitigate risks.”
CyberArk surveyed more than 1,200 security leaders across multiple countries to compile its report. Key findings for Australia from the research include:
- Frequency of outages surges dramatically: Over two-thirds (69%) of respondents have suffered at least one certificate-related outage in the past year, with 63% experiencing outages monthly and 33% weekly;
- Machine identity-related compromises have substantial business impacts: Nearly half (41%) of security leaders reported security incidents or breaches linked to compromised machine identities in the last year, with 45% caused by SSL/TLS certificates. This is 12% above the global average. These led to delays in application launches (48%), unauthorised access to sensitive data or networks (40%) and outages impacting customer experience (29%);
- Machine identity growth continues at pace: Machine identities outnumber human identities by an overwhelming margin and continue to grow quickly. 81% of Australian security leaders anticipate the number of machine identities in their organisation to increase, with over two-thirds (73%) predicting that machine identities will grow by up to 50% and 6% projecting radical growth of more than 50%;
- AI looms large on the machine identity threat horizon: As AI systems become a growing target for cyberattacks, 76% of security leaders believe machine identity security will play a vital role in securing the future of AI. Seventy-seven per cent say securing AI models from manipulation and theft means putting greater emphasis on the need for machine identity authentication and authorisation;
- Machine identity security programs lack maturity: While 89% of security leaders report some form of machine identity security program, many of these programs lack maturity. Respondents reveal the lack of a cohesive machine identity security strategy as their biggest concern (39%), followed by expired certificates leading to service disruptions and outages (39%) and the inability to quickly find and revoke compromised identities (37%); and
- Siloed approach to securing machine identities creates risk: Where multiple tools to secure machine identities exist within organisations, inefficiencies, risk and management challenges are created. For example, responsibilities for preventing machine identity-related compromises were found to be split among security (54%), development (24%) and platform (12%) teams.
“Machine identities of all kinds will continue to skyrocket over the next year, bringing not only greater complexity but also increased risks,” said CyberArk’s Kurt Sand. “Cybercriminals are increasingly targeting machine identities, from API keys to code signing certificates, to exploit vulnerabilities, compromise systems, and disrupt critical infrastructure, leaving even the most advanced businesses dangerously exposed.”
“This research highlights the urgency for security leaders to establish a comprehensive, end-to-end machine identity security strategy that tackles the non-human identities that matter most to prevent potential attacks and outages, especially as AI agents continue to rise and the quantum attack timeline shortens,” he added.
You can read the full report here.