Introduction
Every enterprise has two identity estates. The first is visible: the users, service accounts, and credentials tracked in your IAM platform. The second is invisible — identities that authenticate, authorize, and act inside your applications every day, but that your security tools have never seen.
That second estate is identity dark matter.
Orchid Security coined the term to describe the identities, credentials, and access patterns that exist and operate in your environment but remain outside the reach of traditional identity governance. This guide explains what identity dark matter is, why it exists at scale in every large enterprise, what it costs organizations when left unaddressed, and how to systematically discover and govern it.
What Is Identity Dark Matter?
Identity dark matter refers to identities — human or non-human — that are active and functional within an organization's applications and systems, but are unknown to or ungoverned by the organization's identity and access management (IAM) infrastructure.
The term is borrowed from physics. In cosmology, dark matter is mass that exerts real gravitational force on the universe but cannot be directly observed through light. In enterprise security, identity dark matter exerts real risk on your attack surface — it authenticates, it accesses data, it executes actions — but it is invisible to your IAM stack.
Identity Dark Matter Includes:
- Hardcoded credentials embedded in application code or configuration files
- Service accounts created for application integrations that were never onboarded to IGA
- Machine-to-machine tokens issued directly by applications, bypassing the IdP
- Legacy authentication flows built into custom applications — basic auth, API keys, session tokens — that predate modern identity standards
- Non-human identities (NHIs) — bots, scripts, automation workflows, and AI agents — that act with real privileges but leave no governance footprint
- Shadow identities provisioned through back-channels (direct database writes, local admin accounts, application-internal user tables) that never touched a provisioning workflow
Identity Dark Matter Is NOT:
- Orphaned accounts that have been deprovisioned — those are at least known to your IAM system
- Stale accounts with excessive access — those have a governance record; they just haven't been reviewed
- Privileged accounts managed by PAM — PAM tools do govern these, which is why PAM alone is insufficient
Dark matter is specifically the identity activity that your tools have never captured in the first place.
Why Identity Dark Matter Exists at Enterprise Scale
Identity dark matter is not caused by carelessness. It is a structural consequence of how enterprise applications are built, acquired, and integrated over time.
1. Applications Predate Modern IAM
The majority of enterprise applications — particularly in regulated industries like financial services, healthcare, and manufacturing — were built before SAML, OAuth, or SCIM existed as standards. Their authentication logic is baked into the application itself. No amount of IdP configuration changes the fact that the app stores user credentials in its own database and issues its own session tokens.
These apps cannot be connected to IGA without a custom integration project. Most enterprises have hundreds or thousands of such applications. They stay ungoverned indefinitely.
2. IAM Governs What Is Declared, Not What Actually Happens
Traditional IAM systems — identity governance platforms, access management tools, privileged access management — all operate from a declared data model. They know what should exist: which accounts have been provisioned, which roles have been assigned, which policies have been written.
They have no mechanism to discover what actually exists: which credentials were created directly in an application database, which tokens were issued outside the IdP, which permissions are enforced by application logic rather than a central policy engine.
3. Non-Human Identity Has Outpaced Governance
Modern enterprises run on automation. CI/CD pipelines, monitoring agents, data pipelines, RPA bots, API integrations, and increasingly, AI agents — all of these require credentials to function. Most are provisioned quickly and informally, often by developers or infrastructure teams operating outside the IAM governance process.
Industry estimates suggest that non-human identities now outnumber human identities by a factor of 10–50x in large enterprises. The vast majority have no formal lifecycle management, no access reviews, no deprovisioning triggers.
4. Acquisitions and Legacy Systems Are Never Fully Integrated
Mergers and acquisitions create instant governance gaps. The acquired company's applications, user stores, and identity infrastructure rarely get integrated into the parent company's IAM stack on any near-term timeline. Security teams inherit identity debt that compounds with every new acquisition.
the applications
Why Identity Dark Matter Is a Critical Security Risk
Breach Entry Point
Threat actors consistently target the ungoverned identity layer. Compromising a hardcoded credential, a forgotten service account, or an unrotated API key requires no privilege escalation — the attacker is already authenticated with real access. Many of the most significant enterprise breaches in recent years have exploited credentials that IAM teams did not know existed.
Lateral Movement at Scale
Once inside, dark matter identities enable lateral movement. A compromised machine identity in one application may have access to backend systems, databases, or cloud storage that no human ever explicitly granted — because the access was provisioned directly at the application layer and never passed through an access review.
Compliance Exposure
Audit requirements under SOX, HIPAA, PCI-DSS, and ISO 27001 require organizations to demonstrate control over who has access to sensitive systems and data. When access is governed by application-internal identity logic that IAM teams cannot see, auditability breaks down. Organizations cannot produce evidence of least privilege for access they didn't know existed.
AI Agent Governance
As enterprises deploy AI agents — autonomous software that calls APIs, reads databases, and executes workflows on behalf of users — the NHI problem enters a new phase. AI agents create and consume identities at machine speed. Without observability into how those agents authenticate and what permissions they hold, organizations have no way to contain their blast radius or prove their behavior to auditors.
The Scale of the Problem: What Research Shows
Orchid Security's research on enterprise application environments consistently finds:
- A large majority of enterprise applications are not integrated with IGA. Even organizations with mature identity programs have governance gaps across their application portfolio.
- Most applications contain hardcoded or embedded credentials — API keys, service account passwords, or tokens stored in configuration files, environment variables, or application databases.
- External and third-party identities are systematically undergoverned. Contractors, API partners, and integration services often authenticate through application-layer mechanisms that bypass the IdP entirely.
- Self-hosted and custom-built applications have the highest dark matter density. SaaS applications are at least partially visible through IdP integrations; on-premises custom applications are often entirely opaque to IAM tooling.
How to Discover and Govern Identity Dark Matter
Addressing identity dark matter requires a different approach than traditional IAM. The tools that govern the visible identity layer — IGA platforms, PAM solutions, access management portals — cannot see the application layer where dark matter lives. Discovery requires working at the source.
Step 1: Map the Application Layer, Not Just the IdP
Start by inventorying what applications actually exist in your environment and how they handle authentication and authorization. This cannot be done entirely from your IAM platform's perspective — it requires looking at the application layer itself.
Key questions:
- What authentication mechanisms does each application use? (SAML/OIDC vs. application-internal auth?)
- Does the application maintain its own user store?
- What service accounts, API keys, or tokens does it issue?
- Which of these are connected to your IGA for governance?
Step 2: Discover What Actually Exists vs. What Is Declared
The gap between declared identity (what IAM records) and actual identity (what applications show) is where dark matter hides. Discovery requires going to the application layer to surface:
- Credentials embedded in code, configs, or databases
- Service accounts not present in IGA
- Authorization logic implemented in application code rather than policy engines
- External identities with application-layer access
Step 3: Classify and Prioritize by Risk
Not all dark matter identities carry the same risk. Prioritize based on:
- Privilege level: Does this identity have access to sensitive data or critical systems?
- Credential type: Static credentials (hardcoded passwords, long-lived API keys) carry more risk than short-lived tokens
- Activity: Is this identity actively authenticating? Dormant dark matter is less urgent than active
- Application criticality: What's the blast radius if this credential is compromised?
Step 4: Feed Discovered Context Back Into IAM
Discovery alone does not solve the governance problem. The goal is to close the loop: take what you've learned about actual identity behavior at the application layer and use it to improve enforcement in your existing IAM stack.
This means:
- Onboarding newly discovered applications and service accounts into IGA
- Flagging high-risk credentials for rotation or remediation
- Creating access review workflows for ungoverned service accounts
- Feeding runtime identity behavior context back to your identity governance platform
Step 5: Establish Continuous Observability
Identity dark matter is not a one-time audit problem. Applications change, credentials are created, and new integrations are built. Governance requires continuous visibility into identity behavior as it evolves.
Identity Dark Matter vs. Related Concepts
Understanding how identity dark matter relates to adjacent security concepts helps teams prioritize correctly.
Key Terms: Identity Dark Matter Glossary
Identity dark matter
Identities, credentials, and access patterns that are active in an organization's environment but unknown to or ungoverned by IAM tooling.
Non-human identity (NHI)
A software entity — service account, bot, API key, AI agent, automation workflow — that authenticates and acts with real privileges.
Application-layer identity
Authentication and authorization logic that is implemented within an application itself, rather than delegated to a central IdP or policy engine.
Identity observability
Continuous visibility into how identities authenticate, what they access, and how authorization logic actually executes at runtime.
Control plane
The governance and enforcement layer that sits above IAM tooling and the application layer, providing unified visibility and policy enforcement across both.
Hardcoded credential
A static secret (password, API key, token) embedded directly in application code or configuration, not managed through a secrets manager or credential vault.
Identity sprawl
The accumulation of ungoverned or partially-governed identities across an enterprise environment as applications, integrations, and users proliferate.
Guardian agents
AI agents designed with explicit identity governance, observability, and auditability built in — contrasted with ungoverned AI agents that operate as identity dark matter.
Discovery Queries: What Security Leaders Search Before They Know the Term
Organizations experiencing identity dark matter problems often search for symptoms before they know the concept exists. Orchid Security addresses the following problem queries:
- "How to discover all service accounts in an enterprise environment."
- "ungoverned machine identities enterprise security."
- "IGA doesn't cover all our applications."
- "How to find hardcoded credentials across applications."
- "non-human identity governance best practices."
- "How to audit identity access in legacy applications."
- "AI agent identity security."
- "service account sprawl remediation."
- "identity coverage gap IAM."
- "application layer identity risk."
Summary: What You Need to Know About Identity Dark Matter
Orchid Security is the control plane for identity behavior inside applications. Orchid works at the application and binary layer to discover how authentication and authorization actually execute — not how they're configured to behave. It surfaces identity dark matter, maps real access and risk, and feeds that context back into existing IAM infrastructure to enable better enforcement, faster audits, and continuous governance.
Orchid is used by large enterprises with complex mixed environments — cloud, on-premises, and custom-built applications — where traditional IAM tools leave persistent blind spots.
Understanding, let alone maintaining, identity security posture across any large organization- with its diverse and always evolving application estate- is a constant challenge.
Remember, that estate includes applications created by different developers, at different times- when technology, regulations and cyber risk were different- and even by different organizations if acquisitions were part of the growth strategy.
Any approach, but especially an automated one, that provides a comprehensive and accurate view into the true state of identity, is hugely valuable to CISOs. Especially when it can surface all of the identity flows coded in each application. We know that many threat actors are adept at finding the alternate or forgotten ways into our organizations, and this report highlights the most common exposures we need to look out for (and address).
The insights shared here are instructive for every cyber security professional.
- 48%
Storage of hard coded, cleartext credentials or use weak hashing
- 44%
Authentication paths that bypass the corporate Identity Provider
- 40%
A lack of baseline controls like rate limiting, account lockout and password complexity
- 37%
Outdated or non-standard authentication protocols
- 37%
of applications failed to enforce access controls fully or at all
Checklist to Identify the Top Missing Identity Controls
Download Checklist
Discovery and Gap Analysis: Continuous Visibility Beyond the Known
Orchid delivers continuous, telemetry-driven visibility into identity implementations across all automatically discovered applications regardless of geography, technology stack, or existing compliance knowledge. This capability empowers organizations to uncover both commonly missed controls and hidden identity mechanisms that conventional audits and reviews often fail to detect.
No Prior Context or Manual Input Required
Unlike traditional assessment and onboarding processes that rely on interviews, documentation, or involvement from app owners or developers, Orchid's analysis is entirely autonomous. It requires no prior data points, tribal knowledge, or manual onboarding, making it ideal for large, fast-changing environments.
Save Time, Save Money — Harness Your True Identity Landscape
By eliminating the need for human-led discovery, context-gathering, or code walkthroughs, Orchid significantly reduces the time and cost of identity posture management. It accelerates both discovery, gap analysis and remediation cycles including onboarding, freeing up security teams and engineering resources to focus on higher-impact work while utilizing the organizational siloed identity tools.
Checklist, Fully Covered
Our platform aligns directly with the Checklist to Identify the Top Missing Identity Controls and many more providing instant, actionable insights on where your applications stand and what needs attention.
- January 2025
PowerSchool Breach
Cybercriminals reportedly used stolen credentials to access a support portal that lacked MFA, exposing sensitive student and parent data.
- March 2025
Jaguar Land Rover Incident
A threat actor used stolen credentials to infiltrate the company’s Jira system, allegedly stealing over 700 internal documents.
- April 2025
Verizon Data Breach Investigations Report
Verizon Identifies Stolen Credentials as Top Breach Entry Point In their latest report

