With the absence of individual login credentials, any user can log in to the cloud platform at any time and may add/delete/modify operations.
Due to this nature of anonymity, it is very difficult to figure out who modified what and when. This has direct security and cost implications for the company.
For example, a malicious insider may attempt to transfer a sensitive file/data to someone outside the cloud via email or a pen drive.
If the cloud administrator is not well-equipped to know when, where, how, and what was being leaked, and by whom, it turns out to be a problematic process to investigate insider jobs.