Software flaws in identity management systems are not uncommon, and many have the potential for widespread, stealthy access to cloud environments.