logo
How To Secure Non-Human Identities With Modern IAM

How To Secure Non-Human Identities With Modern IAM

Forbes01-04-2025

Rajat Bhargava is an entrepreneur, investor, author and currently CEO and cofounder of JumpCloud.
getty
Every second, hundreds of automated processes and service accounts access sensitive data without human oversight. These non-human identities (NHIs)—spanning API keys, secrets, tokens and service accounts—operate behind the scenes to power cloud applications, automation and microservices.
NHIs authenticate and execute automated processes between cloud applications and third-party integrations; they allow applications, virtual machines and scripts to access resources securely; and they can generate cryptographic credentials that encrypt and validate communications between automated processes—to name just a few of their uses.
The number of NHIs is growing as organizations race to innovate—or just keep pace with digital transformation. NHIs now often outnumber human users, creating a sprawling network of identities that require immediate attention.
Modern architectures—from DevOps pipelines to serverless computing—rely heavily on NHIs. This creates opportunities for bad actors, where multiple permissions, when exploited together, can lead to catastrophic breaches. Left unsecured, NHIs become prime targets for cyberattacks.
OWASP released its 2025 top 10 risks associated with NHIs, highlighting that a lack of monitoring, excessive permissions and credential mismanagement are just a few of the key issues that can lead to unauthorized access, attacks on infrastructure and data breaches. Unauthorized or poorly managed NHIs can inadvertently grant attackers lateral movement across systems. Such shadow access invites attackers to exploit systems, exposing sensitive data and resources without anyone even knowing.
Security teams often struggle to track these interactions due to the complexity of managing NHIs across cloud and on-premises resources.
Legacy identity and access management (IAM) systems are typically ill-equipped to handle the nuances of NHIs. Designed primarily for human users, these systems have two key weaknesses in relation to NHI.
• Lack Of Visibility: Legacy IAM systems fail to provide insight into how NHIs interact with resources, leaving organizations with significant blind spots.
• Focus On A Reactive Approach (Versus Proactive): Vulnerabilities are detected only after exploitation, limiting the ability to proactively secure systems.
Modern IAM must evolve to secure NHIs by leveraging automated detection, risk prioritization and real-time analytics to mitigate risks before they escalate.
To address the growing risks associated with NHIs, here are five best practices for organizations to adopt proactive strategies:
1. Establish full visibility. Use tools like risk engines and query analytics to map IAM vulnerabilities across NHIs. This approach reveals patterns of cloud data exposure, excessive privileges or overlapping permissions and exploitability. SaaS management capabilities can help reveal which vulnerabilities carry the greatest potential impact.
2. Automate risk detection and remediation. Deploy automated detection mechanisms to identify and address lateral movement, chained access and other high-risk scenarios. Ensure continuous monitoring and timely alerts to reduce reaction times and strengthen overall security posture.
3. Establish governance for NHIs. Implement strict policies to govern NHIs, such as enforcing expiration dates for access keys and conducting regular audits of service accounts. Secure service principles and tokens by aligning with established frameworks that include governance recommendations.
4. Integrate proactive security measures. Adopt a risk-driven IAM strategy that prioritizes areas with the highest exposure and exploitability. Implement a system for monitoring SaaS usage and leverage operational data to predict vulnerabilities and prevent breaches before they occur.
5. Educate and empower security teams. As with all areas of cybersecurity, employees can be a robust bulwark or an extraordinary vulnerability. Regularly provide specialized training on the risks posed by NHIs and equip teams with tools that focus on high-priority threats to minimize alert fatigue.
6. Move to more modern security postures for NHIs. API keys are useful and easy, but there are better ways of providing secure authentication for NHIs. Leverage signed JSON Web Tokens (JWTs) for authentication so that they can't be reused if compromised. Use role-based access where you don't need to have a static credential.
The rapid adoption of cloud technologies and automation has made securing NHIs a top priority. It has also made clear that traditional IAM approaches fail to meet the challenges they introduce. Organizations must evolve their strategies to gain visibility, automate remediation and establish robust governance frameworks.
Securing NHIs isn't just about reducing risk; it's about future-proofing your organization in an increasingly automated world. Given the acceleration of automation and cloud adoption, adopting an IAM strategy that addresses NHI vulnerabilities isn't just a priority—it's mission critical.
The question isn't whether your existing IAM approach is up to the task, but how quickly your organization can rise to the challenge.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Agentic AI: The Next Leap In Container-Based Threat Detection
Agentic AI: The Next Leap In Container-Based Threat Detection

Forbes

time2 days ago

  • Forbes

Agentic AI: The Next Leap In Container-Based Threat Detection

Ranga Premsai - Technical fellow in Cybersecurity and identity management. As organizations race to adopt AI-powered applications, the cybersecurity threat landscape is evolving just as rapidly. At the intersection of innovation and risk lies a growing challenge: How do we secure containerized AI workloads that operate with dynamic access privileges and autonomy? Agentic AI systems capable of independent decision-making have emerged not only as a computational advancement, but also as a critical force multiplier in modern cybersecurity. By leveraging agentic AI for container-based threat detection, organizations can move from reactive security to proactive defense, especially within the realm of identity and access management (IAM). As a technical fellow focused on cybersecurity at Bellevue University, this is something I've been involved in for quite some time now, and I'd like to share my insights on the future of agentic AI with you in this article. In today's cloud-native environments, containerization accelerates deployment but complicates security. Each container may spin up with its own permissions, APIs and ephemeral lifespans, creating a perfect storm for lateral movement and privilege escalation attacks if not managed properly. Traditional IAM approaches involving static rules, manual approvals and periodic reviews are no longer sufficient. We need intelligent, real-time systems that adapt as containers launch, communicate and terminate. Unlike traditional AI models trained to recognize patterns within constrained datasets, agentic AI introduces the notion of context-aware autonomy. These agents operate within defined parameters but can make real-time decisions based on behavioral analysis, risk signals and continuous policy evaluation. Imagine a container running a machine learning job suddenly initiating outbound API calls to services outside its scope. An agentic AI engine can detect this behavior, cross-reference it with learned norms and automatically isolate the container—all without human intervention. Integrating agentic AI into a container security model enhances IAM at three critical layers: 1. Behavioral Access Intelligence: Agentic AI models learn normal patterns of access across containers, users and services. Deviations such as privilege creep or suspicious privilege elevation trigger adaptive response actions. 2. Autonomous Policy Enforcement: Instead of relying on static rules, agentic AI refines policies dynamically. For example, if a container suddenly accesses identity stores or credential vaults, the system can quarantine access and prompt step-up authentication. 3. Audit and Explainability: One often overlooked benefit of agentic systems is their ability to explain decisions. This is essential for IAM teams navigating compliance, audit trails and zero-trust initiatives. For security leaders, this isn't just about adopting another AI capability; it's about rethinking access governance in AI-native ecosystems. Agentic AI doesn't replace IAM teams; it empowers them with visibility, agility and control. However, implementation requires careful consideration. During my time in the industry, I've learned that guardrails must be clearly defined to avoid decision-making drift. Governance structures should include review cycles, simulation environments and risk tolerance thresholds. When done right, agentic AI acts not as a rogue decision-maker, but as a trusted security co-pilot. In a world where digital identities are increasingly interwoven with AI operations, agentic AI offers a path forward: secure, autonomous and intelligent IAM that can scale with innovation, agility and resilience. As enterprise infrastructures become more dynamic and AI systems gain greater autonomy, the need for adaptive security frameworks becomes not just important, but essential. Agentic AI can enable us to move beyond static controls and embrace a responsive, risk-aware model of identity governance. As someone deeply engaged in cybersecurity leadership and AI strategy, I believe this approach will define the next generation of intelligent, context-aware access governance will serve as a foundation for trust in tomorrow's cloud-native and AI-driven digital ecosystems. Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human
Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human

Yahoo

time3 days ago

  • Yahoo

Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human

The company will demonstrate its enhanced Identity Cloud capabilities that secures all identities and will present compelling industry insights in four speaking engagements at the conference LOS ANGELES, May 29, 2025--(BUSINESS WIRE)--Saviynt, a leading provider of cloud-native identity and governance solutions, announced today that it now protects all forms of organizational identities, including Non-Human Identities (NHI). The company has expanded its identity security cloud platform to protect NHIs such as workloads, bots, and credentials. This is in addition to the existing capability of supporting NHI service accounts. The announcement was made just before Identiverse 2025, set for June 3-6 in Las Vegas, where Saviynt executives will lead a workshop on NHI. "Our mission has been to secure every identity," said Paul Zolfaghari, president at Saviynt. "With Saviynt's Identity Cloud, we are delivering a converged platform that protects the entire modern enterprise – from their employee workforce to their external partners, from their cloud workloads to their AI agents. Saviynt has demonstrated it is a complete solution. We are agnostic about the type of identities, we manage them all. This is the future of identity security." As the authority in identity security, Saviynt will spotlight its latest innovations in NHI protection – integrated within its converged platform, The Identity Cloud. Attendees can visit booth #638 to see firsthand how Saviynt is redefining enterprise security by delivering converged, scalable protection through a single pane of glass for all digital identities – human and non-human – at scale. As organizations embrace automation, AI, and cloud-native development, NHIs now vastly outnumber human users – by as much as 100:1 in DevOps environments. Saviynt's Identity Cloud delivers full visibility, posture management, and actionable recommendations for all identities, enabling enterprises to discover and secure every NHI, including workloads, bots, and credentials. The platform extends its best-in-class controls to NHIs, offering deep insight into activity history, usage patterns, and prioritized risk insights – all without the need for additional tools or complex configurations. Saviynt's NHI capabilities are purpose-built to simplify and secure the most complex identity environments, helping organizations eliminate blind spots across cloud and hybrid ecosystems. The platform enables teams to: Discover all non-human identities and their access in a unified view: Get complete, real-time inventory of your non-human identity landscape. Understand security posture of non-human identities with deep analysis: Granular analysis of non-human identity activity and relationships to surface prioritized identity security and compliance issues. Visualize non-human identity activity with timeline view: Surfaces access events, as well as lifecycle changes, to enable faster response and ensure compliance. The growing demand for a converged, intelligent identity security platform has never been more urgent. With Agentic AI accelerating fast, organizations need a modern identity security foundation with the depth and flexibility to govern the right access for every identity — human or machine, known or emerging. Saviynt is at the forefront of delivering on that need. This leadership is reflected in the company's prominent presence at Identiverse, where five of Saviynt's top executives will share their expertise on the most pressing identity challenges and innovations, including how to drive the next wave of innovation to meet the significant identity challenges introduced by Agentic AI. Attendees can attend these expert-led sessions featuring Saviynt executives and customers: Non-Human Identity WorkshopEhud Amiri, vice president of product management and Henrique Teixeira, senior vice president of strategy | 9:00 a.m – 12:00 p.m. PT on June 3 | Mandalay Bay HAmiri and Teixeira will lead a deep-dive workshop exploring the critical importance of securing NHIs, such as workloads, bots, AI agents, and secrets. Participants will learn about the growing risks NHIs pose to enterprises, especially in light of generative AI developments, and gain practical insights on how to detect, manage, and remediate these risks using Saviynt's NHI Maturity Model and risk-based security approaches. GE Healthcare's Journey to Proactive Identity SecurityVibhuti Sinha, chief product officer, with GE Healthcare's Joey Tyler | 2:35 – 3:00 p.m. PT on June 4 | Breakers JSinha and Tyler share GE Healthcare's transformative approach to Identity Security Posture Management (ISPM). This session highlights how moving from reactive to proactive identity security significantly reduces risks and streamlines compliance efforts. Attendees will gain valuable insights into the practical application of ISPM and the benefits realized by one of the world's largest healthcare providers. B2B-IAM Smackdown: Defending the Future of Partner IdentityJeff Margolies, chief product and strategy officer | 10:30 – 11:20 a.m. PT on June 5Margolies presents a forward-looking session on partner identity security, a critical and often overlooked dimension of enterprise identity management. This talk explores emerging threats in B2B identity, challenges in securing third-party access, and how enterprises can proactively defend their partner ecosystems using Saviynt's converged identity platform. Identity: The Superhero No One Invited to the BoardroomDavid Lee, field chief technology officer | 4:00 – 4:25 p.m. PT on June 5 | Mandalay Bay DLee offers a candid look at why Identity and Access Management (IAM) is the foundational technology "glue" holding modern enterprises together—yet often remains undervalued. He discusses the "Identity Plot Twist" driven by AI, decentralized identity models, and machine identities, and makes a compelling case for elevating IAM's role and budget in enterprise security strategies. After a full day of thought leadership and innovation, join Saviynt at the IDMWorks Identity Happy Hour on Wednesday, June 4, from 6:30 to 8:30 p.m. PT at Flanker Kitchen and Sports Bar in Mandalay Bay. Unwind with craft cocktails, hors d'oeuvres, playoff hockey, and great conversation with identity experts and peers from across the industry. To learn more about Saviynt's presence at Identiverse, please visit the website and blog. About Saviynt Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognized as an industry leader in identity security whose cutting-edge solutions protect the world's leading brands, Fortune 500 companies and government organizations. For more information, please visit View source version on Contacts Press Contact Jacklyn

Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human
Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human

Business Wire

time3 days ago

  • Business Wire

Saviynt Showcases the Only Converged Identity Security Platform for All Identities – Human and Non-Human

LOS ANGELES--(BUSINESS WIRE)-- Saviynt, a leading provider of cloud-native identity and governance solutions, announced today that it now protects all forms of organizational identities, including Non-Human Identities (NHI). The company has expanded its identity security cloud platform to protect NHIs such as workloads, bots, and credentials. This is in addition to the existing capability of supporting NHI service accounts. The announcement was made just before Identiverse 2025, set for June 3-6 in Las Vegas, where Saviynt executives will lead a workshop on NHI. 'Our mission has been to secure every identity,' said Paul Zolfaghari, president at Saviynt. 'With Saviynt's Identity Cloud, we are delivering a converged platform that protects the entire modern enterprise – from their employee workforce to their external partners, from their cloud workloads to their AI agents. Saviynt has demonstrated it is a complete solution. We are agnostic about the type of identities, we manage them all. This is the future of identity security.' As the authority in identity security, Saviynt will spotlight its latest innovations in NHI protection – integrated within its converged platform, The Identity Cloud. Attendees can visit booth #638 to see firsthand how Saviynt is redefining enterprise security by delivering converged, scalable protection through a single pane of glass for all digital identities – human and non-human – at scale. As organizations embrace automation, AI, and cloud-native development, NHIs now vastly outnumber human users – by as much as 100:1 in DevOps environments. Saviynt's Identity Cloud delivers full visibility, posture management, and actionable recommendations for all identities, enabling enterprises to discover and secure every NHI, including workloads, bots, and credentials. The platform extends its best-in-class controls to NHIs, offering deep insight into activity history, usage patterns, and prioritized risk insights – all without the need for additional tools or complex configurations. Saviynt's NHI capabilities are purpose-built to simplify and secure the most complex identity environments, helping organizations eliminate blind spots across cloud and hybrid ecosystems. The platform enables teams to: Discover all non-human identities and their access in a unified view: Get complete, real-time inventory of your non-human identity landscape. Understand security posture of non-human identities with deep analysis: Granular analysis of non-human identity activity and relationships to surface prioritized identity security and compliance issues. Visualize non-human identity activity with timeline view: Surfaces access events, as well as lifecycle changes, to enable faster response and ensure compliance. The growing demand for a converged, intelligent identity security platform has never been more urgent. With Agentic AI accelerating fast, organizations need a modern identity security foundation with the depth and flexibility to govern the right access for every identity — human or machine, known or emerging. Saviynt is at the forefront of delivering on that need. This leadership is reflected in the company's prominent presence at Identiverse, where five of Saviynt's top executives will share their expertise on the most pressing identity challenges and innovations, including how to drive the next wave of innovation to meet the significant identity challenges introduced by Agentic AI. Attendees can attend these expert-led sessions featuring Saviynt executives and customers: Non-Human Identity Workshop Ehud Amiri, vice president of product management and Henrique Teixeira, senior vice president of strategy | 9:00 a.m – 12:00 p.m. PT on June 3 | Mandalay Bay H Amiri and Teixeira will lead a deep-dive workshop exploring the critical importance of securing NHIs, such as workloads, bots, AI agents, and secrets. Participants will learn about the growing risks NHIs pose to enterprises, especially in light of generative AI developments, and gain practical insights on how to detect, manage, and remediate these risks using Saviynt's NHI Maturity Model and risk-based security approaches. GE Healthcare's Journey to Proactive Identity Security Vibhuti Sinha, chief product officer, with GE Healthcare's Joey Tyler | 2:35 – 3:00 p.m. PT on June 4 | Breakers J Sinha and Tyler share GE Healthcare's transformative approach to Identity Security Posture Management (ISPM). This session highlights how moving from reactive to proactive identity security significantly reduces risks and streamlines compliance efforts. Attendees will gain valuable insights into the practical application of ISPM and the benefits realized by one of the world's largest healthcare providers. B2B-IAM Smackdown: Defending the Future of Partner Identity Jeff Margolies, chief product and strategy officer | 10:30 – 11:20 a.m. PT on June 5 Margolies presents a forward-looking session on partner identity security, a critical and often overlooked dimension of enterprise identity management. This talk explores emerging threats in B2B identity, challenges in securing third-party access, and how enterprises can proactively defend their partner ecosystems using Saviynt's converged identity platform. Identity: The Superhero No One Invited to the Boardroom David Lee, field chief technology officer | 4:00 – 4:25 p.m. PT on June 5 | Mandalay Bay D Lee offers a candid look at why Identity and Access Management (IAM) is the foundational technology 'glue' holding modern enterprises together—yet often remains undervalued. He discusses the 'Identity Plot Twist' driven by AI, decentralized identity models, and machine identities, and makes a compelling case for elevating IAM's role and budget in enterprise security strategies. After a full day of thought leadership and innovation, join Saviynt at the IDMWorks Identity Happy Hour on Wednesday, June 4, from 6:30 to 8:30 p.m. PT at Flanker Kitchen and Sports Bar in Mandalay Bay. Unwind with craft cocktails, hors d'oeuvres, playoff hockey, and great conversation with identity experts and peers from across the industry. To learn more about Saviynt's presence at Identiverse, please visit the website and blog. About Saviynt Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognized as an industry leader in identity security whose cutting-edge solutions protect the world's leading brands, Fortune 500 companies and government organizations. For more information, please visit

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store