Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

The Hidden Threat in Your Stack: Why Non-Human Identity Management is the Next Cybersecurity Frontier

The Hacker News by The Hacker News
June 10, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently without constant human oversight, which is where non-human identities (NHIs) come in. NHIs — including application secrets, API keys, service accounts, and OAuth tokens — have exploded in recent years, thanks to an ever-expanding array of apps and services that must work together and identify one another on the fly. In some enterprises, NHIs now outnumber human identities by as much as 50-to-1.

However, NHIs introduce unique risks and management challenges that have security leaders on high alert. Forty-six percent of organizations have experienced compromises of NHI accounts or credentials over the past year, and another 26% suspect they have, according to a recent report from Enterprise Strategy Group.

It’s no wonder NHIs — and the difficulties they present with oversight, risk reduction, and governance — have been a recurring topic at Okta’s CISO Forum. Here, we’ll explore their rise, risks, and how CISOs and security leaders are managing them today.

The spectacular rise of NHIs

The rise in NHIs can be traced to the increasing use of cloud services, AI and automation, and digital workflows. It’s a trend that’s likely to continue, as more and more tasks are automated and humans are less of a part of the equation.

NHIs allow apps to authenticate to one another, both inside a specific domain and with third-party applications like cloud services. Those secrets, keys, and tokens are just as sensitive as the credentials used by humans, and in some cases, even more so, as they can provide adversaries with powerful access to specific applications and services if they’re leaked.

CISOs are taking notice. In fact, over 80% of organizations expect to increase spending on non-human identity security.

According to Mark Sutton, CISO at Bain Capital, “Non-human identities have become a focus for teams based on the maturity of their identity and access management programs. It’s quickly becoming the next hottest fire because people have somewhat solved user identities. The natural progression is then to start looking at service accounts and machine-to-machine non-human identities, including APIs.”

Simply put, once organizations establish strong protocols for securing human identities, the logical next step is tackling NHIs. “That, and non-human identities are a part of the threat landscape, and it’s where attackers are going next.”

Secret leakage and other risks of NHIs

Like any other set of credentials, NHIs are sensitive and need to be protected. But while humans can employ robust security measures such as MFA or biometrics to protect sensitive credentials, NHIs often rely on less secure measures for authentication. That can make them easy targets for attackers.

Leakage of NHI secrets can also be a serious concern. This can happen in a number of ways, whether it’s through hard-coding them into an application’s source code or accidentally copying and pasting them into a public document. Secret leakage is a significant problem, and secrets often show up in public GitHub repositories. In fact, security firm GitGuardian found more than 27 million new secrets in public repositories last year. This poses an even larger problem when you consider that NHI secrets are not rotated very often in most environments, so the useful life of a leaked secret could be quite long.

And, because they often require broad and persistent permissions to perform tasks, NHIs can accumulate excessive permissions, further increasing the attack surface. All of this makes NHIs a prime target for attackers and a major challenge for CISOs and their security teams.

Three challenges CISOs face in securing NHIs

While NHIs are now on CISOs’ radar, securing them is another story. Here are three challenges we’re hearing from CISOs, and how they’re managing them:

  1. Gaining visibility. The biggest hurdle in trying to secure and manage NHIs is actually finding them. Visibility into where NHIs lie in an environment can be limited, and discovering all or even most of them is a difficult task. Many organizations have thousands of NHIs that they didn’t even know existed. The old adage “you can’t secure what you don’t know about” holds true here. That means discovering and inventorying NHIs is critical. Implementing an identity security posture management solution can help admins and security professionals identify NHIs across their organization.
  2. Risk prioritization and reduction. The next challenge is prioritizing the risks associated with the NHIs in the environment. Not all NHIs are created equal. Finding the most powerful NHIs and identifying over-privileged NHIs is a key step in securing these identities. Many service accounts and other NHIs have far more privileges than they actually need, which can create risks for the organization. Identifying high-value NHIs and adjusting privileges and permissions can help reduce that risk. “It’s about understanding the blast radius associated with each non-human identity and asking ‘what’s the risk?’ Not all NHIs carry the same threat,” Sutton stressed.
  3. Establishing governance. With so many NHIs being created today, governance has become a real thorn in the side for CISOs. But when they’re not properly governed, bad things can happen — take, for instance, the series of Internet Archive breaches tied to unrotated tokens in October 2024. Often, NHIs are created by developers to serve short-term needs, but they’re rarely tracked or decommissioned properly. Understanding who’s creating NHIs, how they’re creating them, and for what purpose is a good first step. Then, security teams must establish a clear process for managing them so non-human identities can’t be created arbitrarily. “We have to think about what our authentication and password policies are,” says Sutton. “For instance, there are likely many service accounts with weak, static passwords that haven’t been rotated for years. How do we make sure we’re managing those?”

Final thoughts

Non-human identities are essential to businesses today, helping them automate processes, enable integrations, and ensure smooth operations. The challenge: They’re difficult to secure and are an enticing target for threat actors because they’re often non-federated, lack MFA, use static credentials, and have excessive privileges.

At the end of the day, non-human identities and human identities may have different characteristics and needs, but both require an end-to-end approach that protects them before, during, and after authentication. NHIs may not be people, but they’re increasingly powerful actors in your environment. That makes securing them not optional, but urgent.

Join our webcast on August 18th to learn how organizations are reducing risk and complexity by managing all identities — human or not — under one unified system.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
Tariff turmoil: IT procurement and the public sector | Computer Weekly

Tariff turmoil: IT procurement and the public sector | Computer Weekly

Recommended.

Datacentre operators ‘faltering’ on collecting sustainability data, Uptime Institute data shows | Computer Weekly

Datacentre operators ‘faltering’ on collecting sustainability data, Uptime Institute data shows | Computer Weekly

July 31, 2025
AWS sees revenue and profit rise in Q2, bats away competitive concerns | Computer Weekly

AWS sees revenue and profit rise in Q2, bats away competitive concerns | Computer Weekly

August 1, 2025

Trending.

Wesco Declares Quarterly Dividend on Common Stock

Wesco Declares Quarterly Dividend on Common Stock

December 1, 2025
HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

HeyGears Launches Reflex 2 Series 3D Printers – Enabling Users to Go Beyond Prototypes and Start Production

October 24, 2025
⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

⚡ THN Weekly Recap: New Attacks, Old Tricks, Bigger Impact

March 10, 2025
Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign

February 9, 2026
Passwd: A walkthrough of the Google Workspace Password Manager

Passwd: A walkthrough of the Google Workspace Password Manager

December 23, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio