newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Why is non-human identity management the next cybersecurity frontier?
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Why is non-human identity management the next cybersecurity frontier?
Technology

Why is non-human identity management the next cybersecurity frontier?

June 10, 2025 8 Min Read
Share
Why is non-human identity management the next cybersecurity frontier?
SHARE

Table of Contents

Toggle
  • The epic rise of the NHIS
  • NHIS Secret Leakage and Other Risks
  • Three challenges CISOS faces in securing NHIS
  • Final Thoughts

Modern enterprise networks are extremely complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact safely and efficiently without the constant human surveillance of non-human identity (NHI). NHI has exploded in recent years, including application secrets, API keys, service accounts and OAUTH tokens. In some companies, NHIS currently outperforms human identity by up to 50:1.

However, NHIS introduces its own risks and management challenges that are making security leaders a high alert. According to a recent report from the Enterprise Strategy Group, 46% of organizations have experienced compromises in their NHI accounts or credentials, with an additional 26% suspected.

It is no wonder that the difficulty of NHIS in presenting monitoring, risk reduction and governance has become a recurring topic at OKTA’s CISO forum. Here we explore their rise, risks, and how CISOs and security leaders manage them today.

The epic rise of the NHIS

The rise in NHIS can stem from the increased use of cloud services, AI and automation, and digital workflows. More and more tasks are automated and humans are not part of the equation, so it is likely to continue.

NHIS allows apps to authenticate with each other, both within a specific domain and across third-party applications, such as cloud services. Because these secrets, keys, and tokens are as sensitive as the credentials used by humans, and in some cases, they can provide strong access to certain applications and services in the event of an enemy being leaked.

See also  US DOJ seizes four domains that support cybercrime crypto services in global operations

CISO is paying attention. In fact, more than 80% of organizations expect to increase spending on non-human identity security.

According to Mark Sutton, CISO at Bain Capital, “Nonhuman identity has become the focus of the team based on identity and the maturity of the access management program. With some resolution of user identity, it is becoming the next hot fire.

Simply put, once an organization has established strong protocols to ensure human identity, the logical next step is to tackle NHIS. “And also, non-human identities are part of the threat situation and where the attacker moves on.”

NHIS Secret Leakage and Other Risks

Like any other set of credentials, NHIs are sensitive and need to be protected. However, humans can employ robust security measures such as MFA and biometric authentication to protect sensitive credentials, but NHIS often relies on less secure means of authentication. This makes it easier to target attackers.

NHI’s secret leaks are also a serious concern. This can happen in a variety of ways, whether you hardcode it into your application’s source code or accidentally copy it and paste it into a public document. Secret leaks are a serious issue, and secrets often appear in public github repositories. In fact, security company Gitguardian discovered more than 27 million new secrets in a public repository last year. This creates even more problems when you consider that the NHI secrets are not spinning very often in most environments. Therefore, the useful life of leaked secrets can be quite long.

Additionally, because it often requires extensive permanent permissions to perform tasks, NHIS can accumulate excess privileges and increase the attack surface even further. All of this is a major target for NHIS and a major challenge for CISO and its security teams.

See also  How PHI-4 Renersing redefines AI reasoning by challenging the "Bigger Better" myth

Three challenges CISOS faces in securing NHIS

The NHIS is currently on CISOS radar, but securing them is another story. Below are the three challenges we’ve been hearing from the CISO and how they manage them.

  1. Gain vision. The biggest hurdle to trying to secure and manage NHIS is actually finding them. Visibility into the locations of NHIS in the environment may be limited, and discovering all or most of them is a difficult task. Many organizations have thousands of NHIs that they didn’t even know existed. Here, the old saying, “I can’t ensure that I can’t guarantee that I can’t guarantee that I don’t know.” is true. This means that NHIS discovery and inventory are important. Implementing an Identity Security Astute Management Solution helps administrators and security experts identify NHIs across their organizations.
  2. Prioritizing and reducing risk. The next challenge is to prioritize risks related to the NHIS in the environment. Not all NHIs are created equally. Finding the most powerful NHIS and identifying privileged NHISs is an important step in ensuring these identities. Many service accounts and other NHIs have far more privileges than they actually need, creating risk for the organization. Identifying high-value NHIS and adjusting privileges and permits can help reduce that risk. “It’s about understanding the blast radius associated with each non-human identity and asking, “What is the risk?” Not all NHIs are harboring the same threat,” Sutton emphasized.
  3. Establishing governance. Today, so many NHIs are created, governance has become a real thorn on the part of the CISO. But if they are not properly governed, bad things can happen. For example, consider a series of Internet archive violations that were linked to indifferent tokens in October 2024. Understand who is creating NHIs, how they are creating them, and what purposes it is a good first step. Security teams must then establish a clear process for managing non-human identities so that they cannot be created at will. “We have to think about what our authentication and password policies are,” Sutton says. “For example, there may be many service accounts with weak static passwords that have not been spinning over many years. How do I make sure I manage these?”
See also  Increased Gibride AI Images: Privacy Concerns and Data Risks

Final Thoughts

Nonhuman identity is essential to today’s businesses and helps to automate processes, enable integration and ensure smooth operation. Challenges: They are difficult to secure and are attractive targets for threat actors. Because they are often unexpanded, lack MFA, use static credentials, and have excessive privileges.

After all, nonhuman identities and human identities may have different characteristics and needs, but both require an end-to-end approach to protect them. NHIS may not be a person, but they are more and more powerful actors in your environment. It allows them to be made urgent rather than optional.

Join the webcast on August 18th to learn how organizations reduce risk and complexity by managing all their identities (human or not) under one unified system.

Share This Article
Facebook Twitter Copy Link
Previous Article Iran says it executed nine members of the so-called Islamic State group in the 2018 attack Iran says it executed nine members of the so-called Islamic State group in the 2018 attack
Next Article Cooper Flag is the only player the Mavericks are scheduled to train for their No. 1 overall pick Cooper Flag is the only player the Mavericks are scheduled to train for their No. 1 overall pick
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

Why LLMS is thinking too much about simple puzzles, but give up on hard puzzles
Technology

Why LLMS is thinking too much about simple puzzles, but give up on hard puzzles

8 Min Read
Malicious browser extensions will infect 722 users across Latin America since early 2025
Technology

Malicious browser extensions will infect 722 users across Latin America since early 2025

5 Min Read
Researchers have discovered over 20 composition risks, including five CVEs, in the Salesforce industry cloud
Technology

Researchers have discovered over 20 composition risks, including five CVEs, in the Salesforce industry cloud

5 Min Read
DeepSeek-V3 unveiled: How hardware-enabled AI designs reduce costs and increase performance
Technology

DeepSeek-V3 unveiled: How hardware-enabled AI designs reduce costs and increase performance

9 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?