When we are talking about cybersecurity identity, most people think about users, passwords and random mingle tips. But hiding under the surface is an increasing threat that does not provide for human powers, as we see the exponential growth of inhuman identity (NHIS).
On top of the mind when mentioned by NHIS, most security teams immediately think Service accounts. But it goes far beyond this. You have Directors. Roles of snowflake. Already rolesand designs characteristic of the platform, with AWS, Azure, GCP and much more. However, NHIS can change as widely as the services and environments in your modern technological stack, and their management means understanding this diversity.
The real danger is how these identities are authentication.
Secrets: Currency Machines
Inhuman identity for the most part check the authenticity using secrets: API keys, tokens, certificates and other credentials that provide access to systems, data and critical infrastructure. These secrets are what the attackers want. And shocking that most companies do not represent how many secrets they are, where they are stored or who uses them.
A The state of secrets grows 2025. Two statistics on jaws were discovered:
- 23.7 million Only in 2024 the new secrets were traced
- And 70% secrets that are traced in 2022 Still acts today
Why is it going?
Part of the story is that There is no Foreign Affairs for Machines. No tip for verification. When the developer creates a sign, they often provide it with broader access than it takes to make sure everything works.
The dates of fitness? Optional. Some secrets are created with 50-year-old windows. Why? Because the teams do not want the app to break next year. They choose the speed for safety.
This creates a massive explosion radius. If one of these secrets is the leak, it can unlock everything from production bases to cloud resources without causing any alerts.
Detection of disturbed NHIS is much harder than people. Login from Tokyo at 2 o’clock in the morning can lift red flags for humans, but cars talk to each other 24/7 from around the world. The malicious activity goes right in.
Many of these secrets act as invisible to the rear room, allowing lateral movements, chain attacks and unnoticed violations. Incident Toyota Is a great example – one secret leak can take off the global system.
Therefore Attackers love NHIS and their secrets. The permits are too often high, the visibility is usually low, and the consequences can be huge.
Lift machines (and their secrets)
Transition to cloudy, microservice entered thousand NHIS for the organization. And now exceeds human identity from 50: 1 to 100: 1 The coefficient, and it is expected to increase. These digital workers connect services, automate tasks and manage AI pipelines – and each of them needs secrets for functioning.
But unlike human powers:
- The secrets are tough in code bases
- Shared in multiple instruments and teams
- A lie at rest in the inheritance systems
- Transferred to AI agents with minimal supervision
They often Lacking the validity. ownershipand audit.
The result? The secrets of distribution. Excessive access. And one tiny leak from the mass disturbance.
Why the old game book no longer works
For human users, an outdated identity and pam management management were built when everything was in the center. These tools are still doing a great job that performs the complexity of passwords, management of the breakthrough records and regulation of access to internal applications. But nhis completely break this model.
That’s why:
- I and Pam Designed for human identity often related to people and protected by the Foreign Ministry. NHIS, on the other hand, is decentralized – created and managed by the team developers, often on the borders of any central IT or security supervision. Today, many organizations work with several repositories, without a single inventory and policy implementation.
- The secrets managers Help keep secrets – but they will not help you if the secrets are traced through your infrastructure, code bases, CI/CD pipelines or even public platforms such as GitHub or Postman. They are not intended to detect, correct and study impact.
- Tools CSPM Focus on the cloud, but there are secrets everywhere. They are on sources management systems, messaging platforms, laptops for developers and unmanaged scenarios. If the secrets are traced, it’s not just hygiene – it’s Incident security.
- NHIS don’t follow the traditional life cycles. Often not on board, no on board, there is no clear owner and no expiry date. They are delayed in your systems, under the radar until something goes wrong.
Security teams remain pursuing shadows, by hand trying to gather together where the secret came from that it gets access and whether it is even still used. This jet approach is not scale, and it leaves your organization dangerously exposed.
That is where GitGuardian nhi management join the game.
GitGuardian NHI Office: Display Machine Maze
GitGuardian has accepted its deep experience in identifying and restoring secrets and turned it into something much more powerful: a full -layer of control for machine identity and their powers.
That’s what stands out:
Map for a mess
Think about it as the end Visual schedule of all your secrets to the landscape. The map connects the points between:
- Where secrets are stored (eg Hashicorp Vault, Manager Secrets Aws)
- What services are their consumed
- What systems they access
- Who owns them
- Whether they were traced internally or used in the public code
Full control of life
NHI management goes beyond visibility. This lets True managing life cycle Secrets – tracking their creation, use, rotation and recall.
Security teams can:
- Set your automated turn policy
- Unused/orphan data
- To identify the secrets that have not been addressed by months (aka Zombie’s credentials)
Security and saving built in
The platform also includes Political engine This helps teams perform consistent controls in all shelters and landmarks OWASP Top -10.
You can track:
- Covering storage in commands and conditions
- Hygiene secrets (age, use, rotation rate)
- Excessively made nhis
- Groove executions with the passage of time drifts
AI agents: New Wild West
A great driver of this risk Rag (search generation)where AI answers questions using your internal data. This is useful, but if the secrets are hidden in this data, they can pop up by mistake.
AI agents connect to everything – Slack, Jira, Conflunce, Internal Docs – to unlock performance. But with each new relationship risk Secret Grease grows.
The secrets are no longer just leaking from the code. They appear in documents, tickets, messages, and when AI agents access these systems, they can accidentally expose powers in answers and magazines.
What can go wrong?
- Secrets stored in Jiri, concepts, weaknesses, etc., trace
- AI magazines that record sensitive inputs and outputs
- Devies and other suppliers that store unnutrated magazines
- Disassembly of access control in systems
One of the most promising aspects of the GitGuardian platform is that it can help fix the AI secret expansion: “Ai-controlled”:
- Scan of all connected sources – including messaging platforms, tickets, wiki and internal applications – to identify secrets that can be exposed
- Shows you where AI agents gain access to data and flags are dangerous pathways that can lead to leaks
- Cleans logs by deleting secrets before they are stored or transmitted by the organizations threatening
AI moves fast. But secrets are traced faster.
Essence: You can’t protect what you don’t manage
With the management of NHI, GitGuardian offers the basis for organizations to bring the order of chaos and control to the identity layer that has long remained in the dark.
Do you try:
- Specify your secret ecosystem
- Minimize the surface of the attack
- Apply zero confidence principles on machines
- Or just better sleeping at night
The GitGuardian platform can become your new best friend.
Because in the world where the identity is be perimeter, Ignoring inhuman identity is no longer an option.
Want to see NHI management in action?
Ask the demonstration Either check Full product review in Gitguardian.