Non-Human Identity Management

Non-human identities (NHIs) are the largest and fastest growing part of your identity attack surface, outnumbering human identities by an average of 17 to 1. Hackers are attacking NHIs because they know they can avoid human-focused security tools like MFA, so your security and compliance strategies must adapt to secure NHIs as first-class citizens.

Read the data sheet

Challenges in

securing NHIs

Discovery

Most organizations know where some of their NHI accounts are, but have a blind spot for those that might have been created years ago, before any standardized processes were implemented.

Ownership

To secure or govern an NHI, you need a human owner who knows how it’s used. Rotating credentials, doing access reviews, or even verifying that an NHI is still in use needs a person who understands where it fits in your technology stack.

Rotating Secrets

Tools like secrets managers allow you to rotate credentials for NHIs, but what about all the NHI credentials that aren’t in the secrets manager? How do you make sure you don’t take on the security and compliance risk of expired keys?

Intelligent Access at scale for NHIs

Posture &
Misconfigurations

Find and fix misconfigured cloud identities—human and non-human—that enable privilege escalation and lateral movement attacks.

Remove risky
access

Root out inactive, dormant and over-permissioned service accounts, RPA identities, and SaaS integrations.

Out-of-the-box
intelligence

Identify and fix your riskiest NHIs, like service accounts with admin privileges, before they can be exploited by an attacker.

Blast radius
analysis

Identify your high blast radius NHIs—those with broad access to cloud resources—who represent the greatest risk if compromised.

Intelligent access
for NHIs

Discover NHIs across your stack

  • Discover NHIs efficiently across on-prem, SaaS apps, custom apps, and cloud infrastructure.
  • Import data from CMDBs or external spreadsheets to clearly label NHIs and assign human owners.
  • Identify “shadow” NHIs not in your secrets manager and bring them in line with your security and governance policies.

Least privilege for all identities

  • Analyze permissions and activity of NHIs to identify and remove unneeded privileges, including admin permissions, without disrupting business-critical processes.
  • Eliminate shadow NHIs by identifying and restricting the power to create and provision access to virtual machines, lambda functions, certificates, and secrets.
  • Use access requests and role recommendations to create a single streamlined provisioning processes for both human and non-human identities that maintains least privilege.

One platform to govern humans and NHIs

  • Run NHI Ownership Certification campaigns to ensure business need, correct ownership, and least privilege.
  • Secure NHIs in local accounts, and manage human permissions to enforce a secure NHI Lifecycle.
  • Enforce security policies like key rotation for NHIs, and provide useful context to access reviewers, like “Time last rotated” and “Time last used”.
Solutions

NHI use cases

NHIs impact all aspects of the enterprise. Veza helps you discover, secure, and provision NHIs wherever they are.

01

Discover NHIs

Find and label which accounts are non-human across 250+ integrations

Identify “clear” NHIs, like service principals and managed service accounts. Use search and filtering to find “likely” NHIs, for example via naming conventions or lack of MFA. Sync NHI labels in Veza with external sources like CMDBs.

02

Analyze permissions for least privilege

Understand permissions of NHI accounts/keys and right-size to business need

NHIs have been part of Veza’s data model and platform since day one. See all permissions to system resources across all Veza integrations.

03

Assign human owners

Enables governance and manual key rotation

Use Veza Tags to assign human owners to NHIs. Import ownership data from spreadsheets or other external sources.

04

Ensure key rotation

Identify login credentials and security/compliance risks.

Associate credentials with NHIs, and capture metadata from integrated systems, like “Time last rotated” and “Time last used”

05

Access Reviews

NHI owner-driven reviews

Assign reviews of all access to NHIs to their owners for certification. Identify and remove unneeded access.

06

Activity monitoring

Find dormant permissions to fix excess privilege

Know if NHIs are actually using their permissions in core platforms like Snowflake and AWS. Remove unused access.

07

Role recommendations

Create new NHIs that are right-sized to application needs

Optimize the NHI provisioning process to fix over-permissioning at the time of account creation. Eliminate “admin-level” permissions on NHIs where not needed.