According to a joint survey by Cloud Security Alliance and Astrix Security, organizations are facing challenges in securing non-human identities (NHIs), such as bots, API keys, service accounts, OAuth tokens, and secrets. The survey revealed that nearly 1 in 5 organizations have experienced security incidents related to NHIs, highlighting the significant risk NHIs pose to data and critical systems.
The sheer volume of NHIs in organizations amplifies security challenges, as each NHI can potentially access sensitive data and increase the attack surface exponentially. Despite the growing recognition of the importance of investing in NHI security, organizations are struggling with inadequate visibility and control over NHIs. This lack of confidence in current NHI security methods compared to human identity security methods indicates a lag in securing NHIs effectively.
The survey also identified common challenges organizations face in managing NHIs, such as service account management and NHI discovery. While some organizations are investing in NHI security capabilities, many are still reliant on tools that are not specifically tailored to address the unique challenges NHIs present.
One of the major gaps in organizations’ security methods is the inadequate tooling to secure NHIs. The survey found that causes of NHI-related attacks included lack of credential rotation, inadequate monitoring and logging, and overprivileged accounts/identities. This lack of confidence in securing NHIs compared to human identities may be attributed to the fragmented approach many organizations take in managing NHI security.
Organizations are struggling with fundamental security practices related to NHIs, such as auditing and monitoring, access and privileges, discovering NHIs, and policy enforcement. Additionally, gaining visibility into third-party vendors connected by OAuth apps poses a significant challenge, with many organizations reporting low or no visibility into these vendors.
In response to these challenges, there is a growing recognition of the need for robust NHI security, leading to a surge in investments in NHI security capabilities. By investing in NHI-specific tools, adopting unified strategies, and automating critical processes, organizations can enhance their security posture and better protect against evolving threats posed by NHIs.
Overall, addressing NHI security requires ongoing refinement, adaptable strategies, and a unified effort to tackle the ever-evolving threats posed by NHIs. With a proactive stance towards protecting digital infrastructures, organizations can close the gaps identified in the survey and ensure robust security for NHIs in the future. This concerted effort will be crucial in protecting against NHI-related security incidents and safeguarding sensitive data and critical systems from potential threats.

