OWASP NHI Top 10 β Improper Offboarding
Overview
Improper Offboarding refers to the failure to deactivate or remove nonβhuman identities (NHIs)βlike service accounts, machine credentials, and access keysβwhen they are no longer needed. This lapse leads to dormant, orphaned, or vulnerable identities that significantly increase cybersecurity risk.
What Is Improper Offboarding?
In the context of the OWASP NHI Top 10 (2025), Improper Offboarding is ranked as the number one risk. It occurs when NHIs tied to deprecated applications, left behind by departing staff, or managed by personnel no longer responsible, remain active and unmonitored. Astrix defines such unrevoked identities as βstale,β βorphaned,β or βpartially offboardedβ NHIsβcreating critical blind spots in SaaS environments.
How or properly offboard NHIs
- Identify all NHIs linked to applications or personnel.
- Deactivate or decommission NHIs tied to decommissioned systems or departed individuals.
- Transfer ownership and rotate credentials for NHIs still needed by remaining staff.
- Automate through IAM integration, connecting HR systems to identity platforms for real-time revocation.
- Audit and recertify periodically, implementing governance to flag unused or orphaned identities.
Audit findings often reveal active yet abandoned NHIs with elevated permissionsβprime targets for exβemployees or threat actors.
Why Does Improper Offboarding Matter?
Improper Offboarding creates highly exploitable risks:
- Dormant yet privileged identities can be leveraged for lateral movement within cloud environments or Kubernetes clusters.
- Former employees may exploit lingering access keys to remain undetected.
- Noise-free attack paths are created via forgotten NHIs in nonβproduction systems.
Business consequences include data breaches, system compromises, regulatory fines, and serious damage to trust and compliance posture.
Astrixβs Solution for Improper Offboarding
Astrix tackles Improper Offboarding with a turnkey βdiscoverβtoβdecommissionβ pipeline:
- Discover NonβHuman Identitiesβautomatically inventorying service accounts and credentials across cloud environments
- Detect Suspicious NonβHuman Activity to identify NHIs that havenβt been used or reβapproved
- NHI Remediationβstreamlined revocation, rotation, and ownership reassignment workflows
Ready to eliminate orphaned and stale credentials before they become your next incident? See Astrix in actionβbook a live demo to learn how our platform automates endβtoβend offboarding and governance for nonβhuman identities.
Learn more about the OWASP NHI Topβ―10 framework in Astrixβs introduction to the standard β Introducing the OWASP NHI Topβ―10.