The breach began with a single misused account. Minutes later, attackers held keys to systems that were never theirs. This is identity privilege escalation in its rawest form — a small foothold turned into total control.
Identity privilege escalation happens when a user or service gains access rights beyond what was intended. It can occur through stolen credentials, exploited vulnerabilities, misconfigured permissions, or chained exploits across systems. Once escalated, the identity can read, write, or execute operations far outside its assigned role.
The most common vectors include:
- Over-permissive IAM roles in cloud environments.
- Misconfigured SSO integrations that trust unverified assertions.
- Token reuse and session hijacking that bypass normal login flows.
- Unchecked API-to-API delegation where one service grants another more power than needed.
In cloud-native architectures, the blast radius of privilege escalation grows fast. Services talk to services, each authenticated with machine identities. Break one, and lateral movement can spread through layers of APIs, containers, and databases.