Identity -based attacks are increasing. Attacks in which malicious subjects suggest the identity of the subject to easily access resources, and over the past few years have increased number and sensitive data. Some latest reports evaluate this 83% of the attacks provides for broken secrets. According to reports such as Verizon dbirAttackers are more likely to use stolen credentials to obtain the initial fixing rather than operating vulnerability or incorrect configuration.
Attackers are not only after the human identity they can count. Most often they are after inhuman identity (nhis) which exceeds human identity at the enterprise at least 50 to one. Unlike people, machines do not have a good way to achieve multifactorial authentication, and we, for the most part, only hoped for powers, in the form of API keys, carriers and tokens and jwts.
Traditionally, identity and access management (IAM) were built on the idea of sustainable human traits over time. A person rarely changes his name, fingerprints or DNA. It can be assumed that if you have undergone a person’s check process, you have been confirmed by the person you are claiming. Based on this, you can get certain permits that depend on your role in the organization and the level of trust.
Fixing machine identity means to get a case with a unique feature, which really does not care, namely their access keys. If we treat these highly appreciated secrets as a clear definition of the identity we protect, then we can use this into a true observation of how access is provided and used at your enterprise.
Given NHIS through a fracture lens
Before you deeply consider the secrets as unique IDs, let’s first look at how we talk about NHIS in the enterprise now.
Most teams fight NHIS definition. A canonical definition is just “all that is not human”, which is necessarily a wide set of problems. NHIS is manifested by cloud providers, container orchestrators, hereditary systems and the deployment of the edges. The Kubernetes Service account, tied to POD, has different characteristics compared to Azure, controlled by a person or a Windows Service account. Each team has historically ruled them as separate problems. Such a flap approach makes it virtually impossible to create a consistent policy, not to mention the control automation in the environment.
The NHIS exponential growth has left the gap in traditional asset instruments, and the Access reviewers cannot keep up. Application of consecutive permits or security control in such a wildly diverse set of identity seems almost impossible. This is above aging systems that did not turn passwords and checks in years.
Drawing up this issue is the lack of metadata and ownership around NHIS. Questions such as “Why is this person?” Or “Who owns this sign?” Often, it remains unanswered because the person who created and released this identity into the system. This vacuum cleaner accounting makes it difficult to use the basic practices of the life cycle, such as rotation or exploitation. NHIS, which were designed for testing purposes, are often stored long after the systems to which they were connected have been stopped, silently accumulating the risk.
Uuids your zero trust protects the surface
No matter what form or form takes NHI to do the work within the application or system, it needs to carry out authentication to access data and resources and performing their work.
Most often it has the form of secrets that are similar to API keys, certificates or tokens. All of them are essentially unique and can act as crying fingerprints on distributed systems. When used in this way, the secrets used to authenticate become traced artifacts related directly to the systems that created them. This allows you to make an attribution and audit level that is difficult to reach with traditional accounts. For example, a short -term token can be directly related to a specific CI task, accomplishing or loading, allowing teams to respond not only to what is acting, but also why, where and on what name.
This accessory model can bring clarity to your inventory by offering the only kind of all your machines, loads, tasks and even AI -based agents. The secrets offer a consistent and machine method of indexing NHIS, allowing teams to centralize the visibility in what exists, who possesses, and that it can access, no matter whether it works on Kubernetes, GitHub actions or a public cloud.
Critically, this model also supports the management of the life cycle and the principles of zero trust more naturally than the outdated identity framework. The secret is only valid when it can be used, which is an acceptable condition, which means that unused or overdue secrets can be automatically indicated for cleaning. This can stop the expansion of identity and accounts of ghosts that are endemic in the difficult conditions of NHI.
Rachic Security Secrets in NHI IDs
When we are going to talk about secrets as a unique ID for machines and loads, we need to decide the fact that they have an unpleasant tendency to see. According to our The state of secrets are spreading studies 2025Almost 23.8 million secrets in 2024 were traced at GITHUB state repositories, which is 25% compared to last year. What else is worse, full of 35% of the private shelters we investigated, contained secrets, 8 times more As we found in public repositories.
Violated over the past few yearssince Uber by US Finance Ministry. These leaks or stolen powers offer attackers with a low -shaped way for compromise.
The API key leak or the NHI marker allows anyone trying to use it to create a valid session, without a mechanism to check its legitimacy or the context of its use. If the secret is tied to a long time, listed by the Bot or Service account, the attacker instantly inherits everything that trusts.
The problem is enhanced further when secrets are experiencing their goal. Assistant secrets, powers, forgotten and never derived from operation, abandoned CI/CD tasks, or disposable projects, quietly delayed, often with dangerous access levels and zero visibility. Without the processes of ownership, expiration date or recall, they become the ideal entry points for attackers seeking steady and perseverance.
GitGuardian can inventory all your secrets rather than just leaks
Secrets can only live in two possible places: where they belong, safely stored in the repository of secrets or traced elsewhere. We help people find secrets that are traced where they don’t have to be for many years, with our Internally, focused identification of the secrets of detection and our Public Monitoring Platform.
Now GitGuardian can act as your NHI Crossi Inventory platform, helping you get the visibility of what secrets are in your repository as well as metadata around how they are used. GitGuardian creates a single, contextual inventory of each secret, regardless of origin and format. Let it be entered through Kubernetes built into the Ansible Playbook or the repository, like Hashicorp, each secret is curled and controlled.
This is an awareness of the crossed environment allows teams to see quickly
- Which nhis were publicly traced.
- If there are any internal leaks for the same secrets.
- Any secrets that are unnecessarily stored in multiple repositories
- If the secret has long lived and requires rotation
![]() |
Hitgurdish NHI NHI Inventory of the panel, which shows policy violations and risk results. |
The main thing is, GitGuardian also reveals the “zombie” credentials, secretions that are stored without permission and supervision. Rich metadata, such as creator attribution, secret service life, resolution and context, expand the capabilities of management over these inhuman subjects, which provides alignment and accountability in real time.
This visibility not only works, it’s strategically. GitGuardian allows centralized policy implementation in all secret sources, turning the detection of reactive secrets into active identity management. Displaying secrets for NHIS and fulfilling a vital cycle policy such as shelf life, rotation and recall
By -in inventory and toward NHI control
The growth of inhuman identities has redesigned the identity landscape, and with it-the surface of the attack. Accounting is not just access keys. Secrets are a mechanism that allows an attacker to consider a person who already has sustainable access to your data and resources. Without visibility where these powers live, how they are used and whether they are acting, the organizations remain vulnerable to silent compromises.
![]() |
Secrets GitGuardian Secrets Security + NHI Houditannance = Inhuman Identity Safety |
Treatment of secrets as Uuids modern loads is the most clear way to the scalable, platform control of NHI. But this approach works only if you see a complete picture: vaults, pipelines, ephemeral infrastructure and everything in between.
GitGuardian provides this visibility. We turn fragmented accounts into a single, effective inventory. Having secured the NHI identity to its authentication of the secret and layering in the rich metadata and control over the life cycle, GitGuardian allows you to identify the problems early, revealing excessive and orphans, and to force to be removed.
We help complex modern enterprises reduce the likelihood of successful identity attacks. When powers are controlled, inspected and managed in real time, they no longer have undersized fruits for attackers.
We would like to give you a complete demonstration of GitGuardian NHI security platform and help you get an unmatched idea of NHIS and Secrets. And if you want to learn on your own Conduct a GitGuardian excursion with our interactive demonstration!