NHI SECURITY GLOSSARY

Explore Commonly Used NHI Security Terms

a
Agentic AI represents a significant advancement in artificial intelligence, offering autonomous decision-making capabilities that can transform various industries. However, its integration introduces specific security challenges, particularly concerning Non-Human Identities (NHI). This article explores the concept of Agentic AI, its applications, adoption trends, and associated NHI security risks. What is Agentic AI? Agentic AI refers to […]
Learn more
Overview An API key is a unique identifier used to authenticate and authorize applications or services accessing APIs. API keys are essential for enabling secure, automated communication between systems. However, without proper management, they can become significant security vulnerabilities. What Is an API Key? An API key is a string of characters that serves as […]
Learn more
c
Overview A Cloud-Native Application Protection Platform (CNAPP) is an integrated security solution built to protect cloud-native applications at every stage — from development through deployment to runtime. It brings together capabilities such as workload protection, identity security, compliance, and threat detection to secure modern, dynamic cloud environments. What Is a Cloud-Native Application Protection Platform? A […]
Learn more
Overview Credential rotation is the practice of routinely updating authentication secrets such as API keys, passwords, OAuth tokens, and machine credentials. This reduces the risk that compromised credentials will be used in attacks, especially in environments with a high volume of automated connections and third-party integrations. What Is Credential Rotation? Credential rotation ensures that every […]
Learn more
g
The popularity of Generative AI apps such as ChatGPT, Gemini, GPT4, Adobe, and many more is undeniably changing how organizations operate. While these AI-powered apps offer exceptional capabilities to automate tasks and boost productivity, they also pose significant threats and expand an organization’s attack surface through various threat vectors – a major one of them […]
Learn more
i
Overview Identity and Access Management (IAM) is a cybersecurity framework that ensures the right individuals and systems have appropriate access to resources at the right times. IAM encompasses the policies, processes, and technologies that manage digital identities and control access to critical information within an organization. What Is Identity and Access Management? IAM involves the […]
Learn more
Overview Identity Governance and Administration (IGA) is the discipline of managing who or what has access to which resources in an organization — and under what conditions. In modern SaaS ecosystems, IGA extends beyond users to include automated scripts, service accounts, and AI-based tools that also require access governance. What Is Identity Governance and Administration? […]
Learn more
Identity Threat Detection and Response (ITDR) is a framework that focuses on protecting your organization from being compromised by threat actors exploiting your organization’s identities. Practically, ITDR solutions include system policies, best practices, and effective tools to monitor, detect, and respond to identity-based threats in real-time across an organization’s environments. Some other known identity threat […]
Learn more
l
Overview The principle of least privilege (PoLP) is a foundational cybersecurity concept that dictates users, applications, and systems should have the minimum level of access—or permissions—necessary to perform their tasks. By limiting access rights, organizations can reduce their attack surface, mitigate potential breaches, and enhance overall security posture. What Is Least Privilege? Least privilege is […]
Learn more
m
WHAT are Machine Credentials? Machine Credentials are a collective noun for Non-human Identities that operate as digital access keys used by systems. They are used to authenticate and communicate securely with other applications or services in the organization’s environment. By verifying a machine’s unique identity, machine credentials allow safe, agreed-upon interaction. Machine credentials come in […]
Learn more
Imagine giving your AI assistant a universal remote control to operate all your digital devices and services while eliminating the need for custom integrations for each new app. The Model Context Protocol (MCP) is an open-source standardization that creates a single, unified “language” for connecting AI models with various data sources, tools, and external applications. […]
Learn more
Overview Multi-Factor Authentication (MFA) is a security mechanism that requires users to provide multiple forms of verification before gaining access to systems or data. By combining two or more authentication factors—such as something you know (password), something you have (security token), or something you are (biometric verification)—MFA significantly enhances security by reducing the risk of […]
Learn more
n
Non-human identities (NHI) are digital, automated and programmable access credentials that play a crucial role in securing systems, managing access, and ensuring the integrity of digital environments. NHIs come in the form of API keys, OAuth tokens, service accounts, and secrets, and are created daily by employees as they delegate access to external entities to […]
Learn more
o
What are OAuth Tokens?  OAuth (Open Authorization) Tokens are Non-Human Identities that work as a secure authentication mechanism. They delegate access to third parties or external apps without exposing your environment’s sensitive credentials.  Organizations that rely on third-party applications and service integrations in their environments commonly use OAuth tokens. There are different kinds of OAuth […]
Learn more
Overview Environment Isolation refers to separating cloud environments (development, staging, production) and ensuring that non-human identities (NHIs)—such as service accounts, roles, or access tokens—are not shared across them. Failing to isolate environments increases the risk that a compromise in a less secure system (like testing) can propagate to production. What Is Environment Isolation? Environment isolation […]
Learn more
Overview Human Use of NHI occurs when humans—developers, admins, or attackers—use non-human identities (NHIs) like service accounts or API tokens for manual tasks. This misuse compromises accountability, blurs audit trails, and bypasses security controls designed for individual identities. What Is Human Use of NHI? NHIs are built for automated system access, not human interaction. Yet, […]
Learn more
Overview Improper Offboarding refers to the failure to deactivate or remove non‑human identities (NHIs)—like service accounts, machine credentials, and access keys—when they are no longer needed. This lapse leads to dormant, orphaned, or vulnerable identities that significantly increase cybersecurity risk. What Is Improper Offboarding? In the context of the OWASP NHI Top 10 (2025), Improper […]
Learn more
Overview Insecure Authentication refers to the use of deprecated, misconfigured, or weak authentication methods to grant access to non-human identities (NHIs) such as service accounts, API keys, or third-party integrations. These outdated flows expose credentials to interception, privilege escalation, and misuse—making them a common and severe security gap in SaaS environments. What Is Insecure Authentication? […]
Learn more
Overview Insecure Cloud Deployment Configurations occur when CI/CD pipelines, service identities, or trust relationships in cloud platforms are misconfigured, leading to unintended access or exposure of non-human identities (NHIs). These weaknesses open the door to supply chain attacks, privilege abuse, and lateral movement across environments. What Are Insecure Cloud Deployment Configurations? CI/CD platforms enable organizations […]
Learn more
Overview Long-Lived Secrets refer to non-human identity credentials—such as API keys, access tokens, or encryption keys—that persist far longer than necessary. These static, unrotated secrets are high-value targets for attackers because they offer extended or indefinite access once compromised. What Are Long-Lived Secrets? In modern SaaS and cloud environments, NHIs rely on secrets to automate […]
Learn more
Overview NHI Reuse refers to the repeated use of a single non-human identity—such as a service account, API key, or cloud credential—across multiple applications, services, or environments. While convenient, this practice creates significant security risk by broadening the potential blast radius if that identity is ever compromised. What Is NHI Reuse? Non-human identities (NHIs) are […]
Learn more
Overview Overprivileged NHIs are non-human identities—like service accounts, tokens, or automation users—that are granted excessive permissions beyond what they actually need. This violates the principle of least privilege and creates critical attack vectors when these identities are compromised. What Is an Overprivileged NHI? NHIs play a foundational role in SaaS and cloud automation, enabling systems […]
Learn more
Overview Secret Leakage refers to the unintentional exposure of sensitive credentials—such as API keys, tokens, and database passwords—that authenticate non-human identities (NHIs). These secrets often end up in unsecured environments, where they can be exploited for unauthorized access, data theft, or lateral movement. What Is Secret Leakage? Within the OWASP NHI Top 10 framework, Secret […]
Learn more
Overview Vulnerable Third-Party NHIs are non-human identities—like API tokens, service credentials, or OAuth apps—issued to external vendors, services, or development tools that interact with internal systems. When these third-party connections lack proper oversight or become compromised, they present a potent supply chain risk, enabling attackers to exploit trusted integrations to access sensitive systems. What Is […]
Learn more
p
Overview Privileged Access Management (PAM) is the practice of securing, monitoring, and controlling access to critical systems by users or systems with elevated permissions. In modern environments, privileged access is not limited to human administrators — it often includes automated services, scripts, and other non-human identities operating across cloud and SaaS platforms. What Is Privileged […]
Learn more
s
Overview SaaS Security Posture Management (SSPM) refers to the continuous monitoring and management of security risks associated with Software-as-a-Service (SaaS) applications. SSPM solutions help organizations identify misconfigurations, manage user permissions, and ensure compliance across their SaaS environments. What Is SaaS Security Posture Management? SSPM encompasses tools and processes designed to assess and improve the security […]
Learn more
Overview In cybersecurity, a secret is any piece of sensitive information — such as a password, API key, or OAuth token — used to authenticate and authorize access. Secrets underpin secure operations, especially in environments where non-human identities automate processes and integrate systems. If mishandled, secrets become powerful entry points for attackers. What Is a […]
Learn more
What are service accounts? Service Accounts are Non-Human Identity accounts used by machines or apps to communicate with one another within a system, unlike user or human accounts. Service Accounts, using machine credentials, provide privileged identities and permissions for applications, scripts, services, or virtual machines to perform tasks or access resources. This allows different systems […]
Learn more
Overview Shadow IT refers to the use of software, devices, and services without the explicit approval of an organization’s IT department. In today’s SaaS-driven enterprises, these unauthorized tools often emerge as teams seek fast, flexible solutions — but this convenience comes at a serious cost to security, compliance, and governance. What Is Shadow IT? Shadow […]
Learn more
Overview A supply chain attack is a cybersecurity threat in which adversaries infiltrate an organization by targeting its trusted third-party vendors, partners, or software providers. These attacks are increasingly common in SaaS environments, where integrations with external platforms introduce hidden risks and unmonitored access points. What Is a Supply Chain Attack? In a supply chain […]
Learn more
t
Overview Third-party integration refers to the process of connecting external applications, services, or platforms to an organization’s internal systems. In SaaS environments, these integrations enable automation, improve agility, and accelerate innovation — but they also introduce significant security risks, especially when involving non-human identities (NHIs). What Is Third-Party Integration? Third-party integrations involve linking external software […]
Learn more
Overview Token expiration refers to the automatic invalidation of authentication tokens after a predefined period. These tokens — often used by applications, scripts, and services — help systems verify identity without exposing raw credentials. Enforcing expiration ensures these tokens are temporary, limiting their usefulness if intercepted or misused. What Is Token Expiration? A token is […]
Learn more
w
Agentic identity is a digitally ephemeral identity assigned to an AI agent — a software-based system that performs tasks autonomously or semi-autonomously, often acting on behalf of a user, application, or system. What do Gartner analysts say about Agentic Identities?  Gartner defines Agentic Identities as unique, verifiable, and governable identities for AI agents that can […]
Learn more
An MCP Server (Model Context Protocol Server) is a secure framework that allows AI agents and applications to connect to external data, tools, and APIs through a standardized protocol. Acting as the control layer between large language models (LLMs) and enterprise systems, the MCP Server ensures that each interaction is authenticated, authorized, and auditable.This protocol […]
Learn more
Workload Identity Management is the discipline of securing and governing non-human identities (NHIs) — including API keys, service accounts, OAuth apps, CI/CD tokens, webhooks, and increasingly, AI agents — that interact with digital systems across cloud, SaaS, on-prem, and hybrid environments. According to Gartner, Workload Identity Management is an emerging but critical security capability, formally […]
Learn more
z
Overview The Zero Trust Security Model is a modern approach to cybersecurity based on the idea that no user, system, or application — whether inside or outside the network — should be inherently trusted. Every access request must be verified and authorized in real time, aligning with the needs of distributed, cloud-native architectures and the […]
Learn more