The State of Non-Human Identity Security

Cloud Security Alliance & Astrix present the first Non-Human Identity Report!

Based on insights from 800 security leaders, the report unveils the state of Non-Human Identity Security – from top challenges and risks to tooling, programs, and budget allocation.

Key insights from the report include:

Nearly 1 in 5 organizations have experienced a security incident related to Non-Human Identities (NHIs).

Only 19% of organizations have automated processes for offboarding API keys.

69% of organizations are concerned about Non-Human Identities (NHIs) as an attack vector.

38% of organizations have no or low visibility into third-party vendors connected by OAuth apps.

1 in 4 organizations is already investing in Non-Human Identity (NHI) Security.

Learn more about NHI security

CSA and Astrix Research: The State of Non-Human Identity Security

CSA and Astrix Research: The State of Non-Human Identity Security

Massive NHI attack: 230 Million cloud environments were compromised

Massive NHI attack: 230 Million cloud environments were compromised

Part 2: How attackers exploit OAuth: A deep dive

Part 2: How attackers exploit OAuth: A deep dive

Astrix is trusted by industry leaders

“With the rise in automation and new API-based integrations, Astrix’s ongoing monitoring and threat detection of what is accessing our environments became a key capability in our arsenal.”

Yaron Slutzky CISO, Agoda

“Astrix helps us significantly reduce response time to NHI risks and quickly get to the root cause of the problem, which is key for mitigation. Feels like I have an extended security team with Astrix.”

Carl Siva, CISO

“Thanks to Astrix’s behavioral analysis, we get alerts about suspicious connections in real-time and can immediately respond to incidents of stolen or abused tokens.”

Hannu Visti Director of Information Security, Hopper

“Identity has been the foundation for sharp security teams for years. As architectures continue to move to more interconnected ecosystems consisting of both internal and third party systems, non-human identity is more important than ever. Leading security teams are prioritizing the security of non-human identities to keep the business safe and moving fast.”  

Jason Chan, Former CISO, Netflix

“API keys, OAuth tokens, and service accounts are powerful credentials and should be protected as vigorously as user passwords. Astrix has helped us to take control over the app-to-app access layer for the first time.”

Gilad Solomon Head of IT & Information Security, Guesty

“Astrix strengthens our identity security program by providing us with continuous visibility and governance over thousands of non-human identities across the entire organization, from the corporate to the production environments.”

Yaniv Toledano CISO, Pagaya

“Astrix helps us to deal with a growing challenge – tracking the lifecycle and the behavior of a token, especially when provided to a third-party. Astrix creates unprecedented visibility and changes the game for us.“

CISO, S&P 500 Company

S&P 500 Company CISO

“When we all went cloud-native and highly integrated, the identifiers and credentials used to support secure communications and zero trust exploded in number beyond what we saw in the old “on-premise” world. And yes, Astrix Security is absolutely a leader in this space”.

Heather Hinton, Advisory Board Member, Harvard Cybersecurity Program

“Figma was built on the browser. As a cloud-native company, we work tirelessly to ensure that all of our software is secure and stable for our global users. Astrix bolsters our security promise by effectively monitoring risk from SaaS integrations.”.

Devdatta Akhawe Head of Security, Figma

By ensuring NHIs are properly managed and protected, businesses can significantly reduce the risk of unauthorized access and potential breaches. Astrix is addressing a key need for any organization that is moving forward on their Zero Trust journey.”

Chase Cunningham, Dr. ZeroTrust