After last week’s Gartner’s 2024 IAM Summit, the importance of Identity Security can not be underestimated. It is also evident that while NHI is a hot topic, human identity remains unresolved, and we must address these issues together.
Gartner considers identity-centric security a top priority for 2025. The main conditions that have led to this focus include:
The recent hype around NHI has thrown fuel on the fire. Recent estimates suggest that each human user has between 10 to 50 NHI. This year's major identity security incidents include the AWS ransomware incident and Snowflake breach, just a few of the many attacks this year.
The pervading notion that NHI should be the sole focus is flawed, as human risk remains an equally unresolved issue for identity security teams.
The root cause of the cloud identity security problem is the rapid pace of change and lack of visibility into permissions. In fact, 95% of cloud identities, both human and NHI, have been deemed overprivileged.
At the end of the day, the goal is to reduce the blast risk because a compromised identity, human or NHI, should not equal a breach.
Lifecycle Management: NHI are tied to the lifecycle of a human identity
A human user’s risk is tied to its identity posture and permissions, as well as the posture and permissions of all NHIs they own. To reduce the blast radius of an identity compromise, you must manage the risk and lifecycle of human identity and NHI together.
While NHIs operate autonomously, they require continuous management and must be tied to a human identity for accountability and compliance.
Human owners play a critical role in NHI management, reducing operational impacts and proving compliance. They are essential for key rotations, proper permissions, identity lifecycles, and access reviews.
Ultimately, both human identities and NHI will be compromised, and it is crucial to limit your exposure when (not if) it happens.
To reduce complexity stemming from fragmented data and solutions, human identity and NHI must be addressed together as a core requirement on your journey to Zero Trust
After last week’s Gartner’s 2024 IAM Summit, the importance of Identity Security can not be underestimated. It is also evident that while NHI is a hot topic, human identity remains unresolved, and we must address these issues together.
Gartner considers identity-centric security a top priority for 2025. The main conditions that have led to this focus include:
The recent hype around NHI has thrown fuel on the fire. Recent estimates suggest that each human user has between 10 to 50 NHI. This year's major identity security incidents include the AWS ransomware incident and Snowflake breach, just a few of the many attacks this year.
The pervading notion that NHI should be the sole focus is flawed, as human risk remains an equally unresolved issue for identity security teams.
The root cause of the cloud identity security problem is the rapid pace of change and lack of visibility into permissions. In fact, 95% of cloud identities, both human and NHI, have been deemed overprivileged.
At the end of the day, the goal is to reduce the blast risk because a compromised identity, human or NHI, should not equal a breach.
Lifecycle Management: NHI are tied to the lifecycle of a human identity
A human user’s risk is tied to its identity posture and permissions, as well as the posture and permissions of all NHIs they own. To reduce the blast radius of an identity compromise, you must manage the risk and lifecycle of human identity and NHI together.
While NHIs operate autonomously, they require continuous management and must be tied to a human identity for accountability and compliance.
Human owners play a critical role in NHI management, reducing operational impacts and proving compliance. They are essential for key rotations, proper permissions, identity lifecycles, and access reviews.
Ultimately, both human identities and NHI will be compromised, and it is crucial to limit your exposure when (not if) it happens.
To reduce complexity stemming from fragmented data and solutions, human identity and NHI must be addressed together as a core requirement on your journey to Zero Trust