It came from a vendor account with elevated infrastructure access. One click later, you’re staring at a problem that could cripple production.
Infrastructure Access Vendor Risk Management is the discipline of controlling, monitoring, and minimizing risks from third-party access to your systems. It is no longer optional. Vendors need access to perform their work, but that access can also create the widest attack surface in your environment.
The first step is visibility. You cannot manage what you cannot see. Maintain a live inventory of all vendor accounts, what systems they can touch, and what permissions they have. This list must be accurate to the hour, not the month. Every stale credential is a potential exploit.
Next, enforce least privilege infrastructure access. A vendor should have no more permissions than are required for their immediate task. Reduce the blast radius of any breach by segmenting networks and isolating high-value assets. Combine this with time-bound access so credentials expire automatically when work is done.