Defense and government environments carry the standard enterprise credential gap —
amplified by classified information, cleared contractor populations, complex supply chains, and AI deployment
mandates that are creating non-human identity risk at pace.
01 — National security
Classified and CUI credential access
Credentials that access Controlled Unclassified Information (CUI) and
classified networks are the highest-value targets in the threat landscape. State-sponsored actors
specifically target contractor credentials as the entry point to government networks — because contractors
are often less hardened than the government organisations they serve, and their credentials provide direct
access to the systems those organisations depend on.
A credential breach in a defence environment does not cost money first. It
compromises operational security, exposes intelligence sources, and can endanger personnel in the field.
02 — Supply chain
Cleared contractor and vendor credentials
Defense and government organisations depend on extensive contractor and
vendor ecosystems — cleared personnel, managed service providers, software vendors, system integrators. Each
holds credentials to government networks. SolarWinds reached 18,000 organisations through one vendor’s build
credential. OPM was breached through one contractor’s stolen credential. The supply chain credential is the
attack surface most difficult to see and fastest to exploit.
The OPM director confirmed in congressional testimony that the breach entered
through a contractor credential. 22.1 million security clearance files were the consequence.
03 — AI deployment mandate
FY26 NDAA AI credential governance gap
The FY26 National Defense Authorization Act mandates demonstrable AI
governance across defence networks. Every AI agent deployed on government networks holds credentials to the
systems it accesses. Those credentials are created by development teams, stored in configuration
environments, and typically ungoverned by any central authority. The mandate requires AI governance —
credential governance for non-human identities is the unsolved layer of that requirement.
AI agents on defence networks without credential governance are the next
SolarWinds-equivalent attack surface: ungoverned, trusted, and operating at machine speed.
04 — Regulatory
CMMC 2.0 personal certification
CMMC 2.0 requires defense contractors to certify their cybersecurity
posture — including named individual certification for senior management responsible for CUI access
governance. Unlike previous compliance frameworks, CMMC 2.0 places personal accountability on named
individuals for access control failures. Policy assertions are not sufficient — demonstrable technical
controls are required for Level 2 and Level 3 certification.
In CMMC 2.0, weak access control is not a compliance gap — it is personal
liability.
05 — Insider threat
Cleared personnel credential misuse
The insider threat in defence environments is uniquely dangerous
because cleared personnel have legitimate access to sensitive systems. When a cleared employee decides to
misuse that access — or is coerced by a foreign intelligence service — they are using a real credential for
a real system they are authorised to access. Monitoring tools see normal behaviour. The credential itself is
the attack vector, not the detection gap.
Insider misuse is a permanent live attack path where employees hold credentials.
06 — Zero Trust compliance
Executive Order 14028 and the credential layer
Executive Order 14028 mandates Zero Trust Architecture across US
federal agencies. NCSC and Cabinet Office guidance pushes the same framework for UK government. Zero Trust
verifies identity at every access request — but it depends on the credential being presented being
legitimate. A credential that was stolen, phished, or used after a contractor departed passes Zero Trust
verification. ZTA governance requires credential control as its prerequisite layer.
Zero Trust without credential control verifies the attacker as a legitimate
user.