Lead Image © ARMMY PICCA, 123RF.com
Identity for Machines, Workloads, and Agents
Digital Colleagues
Non-human identities (NHIs) are not a new phenomenon, but they are rapidly becoming increasingly prevalent and complex. NHIs include identities for workloads, services, Internet of Things (IoT) devices, machines, and, increasingly, autonomous artificial intelligence (AI) applications. Studies and observations in corporate environments show that NHIs exceed the number of human identities many times over: Ratios of 40:1 to 80:1 have been reported. Whether or not these numbers are accurate, clearly NHIs give rise to an identity and access management (IAM) and cybersecurity problem of a considerable magnitude, giving rise to a variety of security risks and prompting the need for automation.
The challenge lies not only in the sheer numbers. NHIs are often created automatically, for example, as part of continuous integration and continuous delivery (CI/CD) pipelines or through instances of Kubernetes pods. Their lifespans can range from a few seconds to several years, and their privileges range from simple read access to comprehensive administrative rights.
The majority of today's NHIs are either unknown or work with static access credentials that do not change over long periods of time. This combination of opacity and permanent authorizations creates a massive attack surface that classic strategies in the area of IAM do not address. The strategies currently in place only consider human identities and a small subset of NHIs – the technical and functional user accounts managed by privileged access management (PAM; i.e., service and system accounts to be more precise).
Management of Non-Human Identities
Different terms are sometimes used synonymously with the umbrella term "non-human identity management" for strategies, technologies, and processes, and sometimes specific sub-areas (Table 1).
Buy this article as PDF
(incl. VAT)
Buy ADMIN Magazine
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
