Insider risk on the rise as survey finds 50% of employees have too much privileged access - and AI will make it far worse

Insider Threat
Image Credit: Shutterstock (Image credit: Andrea Danti / Shutterstock)

  • Half of employees hold excessive rights across AI and SaaS estates, CloudEagle report finds
  • Invisible IT hides 60% of apps undermining traditional identity controls
  • Study recommends AI governance plus just in time access and reviews

Half of enterprise staff now hold excessive privileges to critical applications, new research has claimed.

CloudEagle.ai’s latest identity governance report surveyed 1,000 CIOs and CISOs and found 60% of SaaS and AI tools sit outside IT’s oversight.

Invisible IT is expanding insider risk, driving breaches, audit failures, and compliance headaches, the report says.

Privilege creep

It found 70% of leaders listed unsanctioned AI tools as a leading data worry, while 48% admitted former staff still hold access, even months after leaving.

Privilege creep is common, yet only five percent of organizations actively enforce least privilege settings, and just fifteen percent use just in time access company wide, despite mounting proof that temporary credentials cut risk and audit scope.

“Traditional IAM [Identity and Access Management] tools can’t keep up with today’s SaaS and AI-driven environments because not all apps are managed by IT, and not everything sits behind a centralized IAM system. IGA [Identity Governance and Administration] is at a tipping point, and enterprises must shift to AI-driven access management to stay secure and compliant,” says Nidhi Jain, CEO and Founder, CloudEagle.ai.

CloudEagle.ai’s platform positions itself as an AI-centric answer, yet the report stresses that technology alone is not enough.

It recommends appointing a Chief Identity Officer to coordinate policies across business units and automate provisioning, reviews, and removals. Zero trust, context-aware controls should replace broad standing access, while behavioral analytics help flag anomalies before they become incidents.

The study also suggests continuous access reviews powered by machine learning can shrink privilege windows without slowing work.

With shadow SaaS use rising and insider-led events now dominating breach reports, the era of annual checklists appears to be over.

Analysts say boards pay closer attention as regulators fine organizations for permission sprawl that exposes customer records and intellectual property. Without time view of every identity, leaders concede they cannot meet zero trust goals or prove compliance under cyber insurance questionnaires.

You might also like

Wayne Williams
Editor

Wayne Williams is a freelancer writing news for TechRadar Pro. He has been writing about computers, technology, and the web for 30 years. In that time he wrote for most of the UK’s PC magazines, and launched, edited and published a number of them too.

You must confirm your public display name before commenting

Please logout and then login again, you will then be prompted to enter your display name.