quote from pentest report (asked if this is ok):
(great work, sadly NDA'ed)
"We bypassed the internal SSH Zero Trust Gateway because its service account was setup to fully trust the [...] Continuous Integration. Due to the chosen Zero Trust gateway this compromise was undetectable, because there are no logon events on the target Linux systems being recorded [... This had been disabled by the admins because there was no log investigation procedure for this.]"
#zerotrust seems to have basic requirements. No basics, and Zero Trust becomes Blind Trust.
I am interested in what others do with automation / #continousintegration and Zero Trust. Obviously the login secrets have to be stored in CI. And no one will ever check these CI logon logs, because these are too many.
Architecturally this is a challenge.