Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
What's Hot

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Spanish
Fyself News
Home » Why NHIS is the most dangerous blind spot in security
Identity

Why NHIS is the most dangerous blind spot in security

userBy userApril 25, 2025No Comments7 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

When talking about cybersecurity identity, most people think about usernames, passwords, and the occasional MFA prompts. However, lurking beneath the surface is a growing threat that does not contain any human credentials, as it witnesses the exponential growth of non-human identity (NHI).

When NHIS is mentioned, at the top of the mind, most security teams immediately think of service accounts. But that’s far beyond that. There are service principals such as AWS, Azure, GCP, Snowflake roles, IAM roles, and platform-specific components. The truth is that NHIS can be as different as the services and environments of modern technology stacks, and managing them means understanding this diversity.

The real danger lies in how these identities are authenticated.

Secret: Machine Currency

Most nonhuman identities use secrets to authenticate: API keys, tokens, certificates, and other credentials that grant access to systems, data, and critical infrastructure. These secrets are what attackers want most. And to my surprise, most companies don’t know how many secrets they have, where they are stored, or who is using them.

The secret state spread in 2025, revealing statistics of two jaw dropping.

23.7 million new secrets were leaked on public Github in 2024 alone, and 70% of the secrets leaked in 2022 are still valid today

Why is this happening?

Part of the story is that there is no MFA for the machine. There is no verification prompt. When developers create tokens, they often allow more access than they need to be, just to make sure things work.

date of expiry? option. Several secrets have been created in the 50-year effectiveness window. why? Because the team doesn’t want to break the app next year. They choose speed over security.

This creates a large blast radius. If one of these secrets is leaking, you can unlock everything from production databases to cloud resources without triggering an alert.

Detecting compromised NHIS is much more difficult than humans. Logging in from Tokyo at 2am may raise a red flag for people, but the machines speak 24/7 from all over the world. Malicious activities blend quickly.

Many of these secrets act like an invisible background, allowing for lateral movement, supply chain attacks, and undetected violations. The Toyota Incident is a perfect example. Leaked secrets can defeat the global system.

This is why attackers love the NHIS and its secrets. There are too many permits, generally low visibility, and the results can be enormous.

The rise of machines (and their secrets)

The transition to cloud-native, microservice-rich environment has implemented thousands of NHIs per organization. NHIS currently outperforms human identity from a ratio of 50:1 to 100:1 to 100:1. This is expected to increase. These digital workers connect services, automate tasks, and drive AI pipelines. All of them need a secret to work.

However, unlike human qualifications:

Secrets are hardcoded in a codebase shared by multiple tools, and dormant teams in legacy systems passed to AI agents with minimal monitoring.

Many lack expiration dates, ownership and auditability.

result? The secrets spread. Over-access. And one small leak from a massive violation.

Why Older Playbooks Don’t Work anymore

Legacy Identity Governance and PAM tools were built for human users, in an age where everything is centrally managed. These tools do great jobs that implement password complexity, manage your breakgrass accounts, and dominate access to internal apps. However, NHIS completely defeats this model.

Here’s why:

IAM and PAM are designed for human identity, often tied to individuals and protected by MFA. Meanwhile, NHI is decentralized. It is created and managed by developers across the team, and is often not central IT or security monitoring. Today, many organizations operate multiple safes, with no uniform inventory or policy enforcement. Secret Managers help you save secrets, but if secrets are leaked across infrastructure, codebases, CI/CD pipelines, and even public platforms like GitHub and Postman, they won’t help you. They are not designed to detect, correct, or investigate exposure. Although CSPM tools focus on the cloud, the secrets are everywhere. They are found in source control management systems, messaging platforms, developer laptops, and unmanaged scripts. When secrets are leaked, it’s not just a hygiene issue, it’s a security incident. NHIS does not follow the traditional identity lifecycle. Often there is no onboarding, offboarding, clear ownership and expiration date. They will remain in your system under the radar until something goes well.

The security team is chasing the shadows and trying to manually stitch together where the secret comes from, what it accesses, and whether it is still in use. This reactive approach is not scaled and exposes tissue to a dangerous extent.

This is where Gitguardian NHI governance comes into play.

Gitguardian NHI Governance: Mapping Machine Identity Mazes

Gitguardian took deep expertise in detecting and repairing secrets and turned it into something more powerful. It is a complete governance layer of machine identity and its qualifications.

This is what stands out:

Map for confusion

Think of it as an end-to-end visual graph of the entire secret. The map connects the dots between the following:

If the secret is stored (e.g. Hashicop Vault, AWS Secret Manager), which system to use does it access the system that accesses the owner, whether it is leaked internally or used in public code?

Complete Lifecycle Control

NHI governance exceeds visibility. This allows for true lifecycle management of secrets – tracking their creation, usage, rotation, and cancellation.

The security team:

Auto-rotation policy setting deprecated Unused/orphan credentials detect secrets that have not been accessed for several months (aka zombie credentials)

Security and compliance, built-in

The platform also includes a policy engine that helps teams implement consistent control across all safes and benchmark themselves against standards such as the OWASP Top 10.

You can track it:

Vault coverage between teams and environments Secret Hygiene Indicators (age, usage, rotation frequency) Over-rich compliance attitudes drift over time

AI Agent: The New Wild West

The driver of this high risk is RAG (searched generation), where AI uses internal data to answer questions. It is useful, but if the secrets are hidden in that data, they can be falsely surfaced.

AI agents are connected to everything: Slack, Jira, Confluence and Internal Docs to unlock productivity. However, with each new connection, the risk of a secret sprawl increases.

The secret is not leaked from the code anymore. They appear in documents, tickets, messages, and when AI agents access those systems, they can incorrectly publish their credentials to the response or log.

What’s not going well?

Secrets stored in Jira, Concepts, Slack, etc. are leaking AI logs that capture sensitive input and output development and output dev and third party vendors that store undegraded logs.

One of the most positive aspects of the Gitguardian platform is that it helps to fix AI-driven secret sprawls.

To detect secrets that can be exposed to AI, it scans all connected sources, including messaging platforms, tickets, wikis and internal apps, indicating where the AI ​​agent is accessing your data, leading to flags insecure paths that could lead to leaks, and removes secrets before deleting secrets before they are stored.

AI is moving fast. But the secrets are leaking faster.

Bottom line: You cannot protect what you do not govern

With NHI governance, Gitguardian provides a blueprint for organizations to bring order to chaos and control over identity layers that have long remained in the dark.

Whether you are trying to:

Enforce the zero-trust principle of machine-wide minimizing attack surfaces that map secret ecosystems, or sleep better at night

The GitGuardian platform may be your new best friend.

Because in a world where identity is boundary, ignoring non-human identities is no longer an option.

Want to see NHI governance actually working?

Request a demo or check out Gitguardian’s overall product overview.

Did you find this article interesting? This article is a donation from one of our precious partners. Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMoray West Wind Farm set to carry half a Scottish home
Next Article New critical SAP NetWeaver flaws have been exploited by the drop web shell, the Blue Tratel framework
user
  • Website

Related Posts

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

June 21, 2025

Qilin ransomware adds “Cole Lawyer” feature that puts pressure on victims for larger ransoms

June 20, 2025

Television in Iranian states hijacked mid-distance broadcasts amid geopolitical tensions. $90 million stolen from Crypto Heist

June 20, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How a hardware wallet protects your private key: Security and safety instructions

Cartoonist Paul Pope is more worried about killer robots than AI plagiarism

Review Week: Meta reveals Oakley Smart Glasses

Spiders scattered behind M&S and cooperative cyberattacks, with up to $592 million in damages

Trending Posts

Sana Yousaf, who was the Pakistani Tiktok star shot by gunmen? |Crime News

June 4, 2025

Trump says it’s difficult to make a deal with China’s xi’ amid trade disputes | Donald Trump News

June 4, 2025

Iraq’s Jewish Community Saves Forgotten Shrine Religious News

June 4, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

How a hardware wallet protects your private key: Security and safety instructions

Top Startups and High-Tech Funding News for the Weekly Ends June 20, 2025

Apple is talking to you to win AI startup confusion

Mira Murati’s AI Startup Thinking Machine Lab emerges from stealth at $20 billion seed and $1 billion valuation

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.