Skip to content
Menu
IT-DRAFTS
  • About
  • My Statistics at Microsoft Q&A
  • Privacy policy
IT-DRAFTS
February 21, 2025

OWASP Top 10 NHIs Risks 2025

1. Improper Offboarding

  • When NHIs (Non-Human Identities) like service accounts, API keys, and machine credentials are not properly offboarded, they can become a security risk.
  • This includes failing to deactivate old or deprecated secrets, leading to “zombie NHIs” that attackers can exploit.
  • Automating the NHIs lifecycle ensures stale secrets are discovered and revoked, reducing attack surfaces.

2. Secret Leakage

  • NHIs often store sensitive credentials (secrets) in multiple locations. If these secrets are not properly managed, they can leak into public repositories, logs, or insecure environments.
  • Automated secret detection helps in identifying and remediating such leaks before they become a threat.

3. Vulnerable Third-Party NHI

  • NHIs are often used to interact with third-party services. If third-party integrations are not secured, attackers can exploit weak NHIs to access sensitive data.
  • Mapping and inventorying NHIs across third-party assets help track potential vulnerabilities.
  • Honeytokens (decoy credentials) can be used to detect unauthorized access and improve incident response.

4. Insecure Authentication

  • Weak authentication methods for NHIs, such as using outdated hash algorithms (e.g., SHA1), low-entropy secrets, or hardcoded credentials, increase the risk of compromise.
  • Enforcing strong authentication mechanisms, such as rotating credentials and using stronger encryption algorithms, enhances security.

5. Overprivileged NHI

  • Granting NHIs excessive permissions increases the risk of lateral movement in case of compromise.
  • Enforcing the principle of least privilege ensures NHIs only have the minimum access required to perform their functions.
  • Secret analyzers and permission monitoring tools help in managing access rights efficiently.

6. Insecure Cloud Deployment Configurations

  • NHIs used in cloud deployments may have misconfigured permissions, static secrets, or inadequate access controls.
  • CI/CD pipelines should enforce security best practices, such as detecting hardcoded secrets, enabling secret vaulting, and ensuring proper permission scoping.

7. Long-Lived Secrets

  • NHIs using long-lived credentials (e.g., API keys that don’t expire) pose a high security risk.
  • Implementing automated secret rotation policies and enforcing expiration best practices mitigate these risks.

8. Environment Isolation

  • NHIs should not have access to multiple environments (e.g., development, testing, production) unless absolutely necessary.
  • Monitoring and enforcing strict environment-specific access controls prevent unauthorized data exposure.

9. NHI Reuse

  • Reusing the same NHI (e.g., API key or service account) across multiple applications increases security risks.
  • Vault integrations should be used to enforce unique NHIs per application, reducing exposure in case of a breach.

10. Human Use of NHI

  • NHIs are meant for automated systems, but when humans misuse them (e.g., manually using service accounts for access), it leads to security gaps.
  • Audit logs should track NHI activity, and identity access should be enforced using robust frameworks like SPIFFE (Secure Production Identity Framework for Everyone).

Categories

ActiveDirectory AI Azure cloudnetworking CloudSecurity Conditional Access Copilot CrowdStrike Cybersecurity CybersecurityThreats DataSecurity DigitalTransformation DNS GDPRcompliance Howto Innovation insider licensing MFA Microsoft Microsoft365 Microsoft AI MicrosoftAzure Microsoft ML MicrosoftOffice Microsoft Product MS Entra MSteams network NewRelease Office2024 OfficeSuite OWASP PrivacyRights ProductivityTools sam Security software SoftwareUpdate TechNews Technology updates Windows Windows10 Windows11

Archives

  • June 2025
  • May 2025
  • February 2025
  • October 2024
  • September 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
No comments to show.

Recent Comments

Recent Posts

  • Your Certificate Authority might betray u, like… for real :)))
  • Microsoft security copilot: how it catches hackers with ai
  • Windows 11 Insider Preview Build 26120.4230
  • Global Expansion of TURN Relay Infrastructure for Azure Virtual Desktop and Windows 365
  • How to Create and Manage a Public DNS Zone in Azure via the Portal
©2025 IT-DRAFTS | Powered by WordPress and Superb Themes!