Do You Know How to Evaluate Machine Identity Risks and Controls?