What Most Companies Get Wrong About Non-Human Identity Management
May 30, 2025
2 mins

Matt (Co-Founder and CEO)

By now, youโve heard the message: most things logging into your systems arenโt people.
Theyโre agents, bots, services, scripts โ non-human identities (NHIs) that outnumber users and often hold more power than them.
And yetโฆ even companies that know this still get NHI management dangerously wrong.
Letโs break down the 5 most common mistakes we see โ and why they leave your systems exposed.
โ Mistake 1: Treating NHIs Like Users
Many teams create fake โbot usersโ or service accounts in their auth system and assign them login credentials.
Sounds harmless โ but it breaks:
Visibility (you canโt tell humans from agents in your logs)
Ownership (no clear mapping to teams or workflows)
Security (these accounts often skip MFA and rotate nothing)
Fix: Treat NHIs as their own identity type with their own controls.
โ Mistake 2: Static Credentials, Forever
Hardcoded API keys. Secrets in .env files. Long-lived tokens shared across environments.
These are time bombs. One leaked key gives permanent access until someone finds and revokes it โ which might take months (or never happen at all).
Fix: Issue short-lived, scoped credentials that rotate automatically. Expire what isnโt used. Lock credentials to their runtime environment.
โ Mistake 3: No Audit, No Accountability
If an agent pushes to production at 3AM, who approved that? What did it change? What else can it access?
Most orgs canโt answer these questions โ because most agent actions are unaudited and unauthenticated beyond the first hop.
Fix: Attach agents to specific humans or teams. Log every action. Flag anomalies like โnew agent calling production DB.โ
โ Mistake 4: Manual Access Configs
Giving an agent access to a service often means hand-writing a YAML file, clicking through IAM settings, or pasting secrets into a config file.
This doesnโt scale. And worse โ it creates drift, inconsistent permissions, and brittle dependencies.
Fix: Manage agent access as code. Use policies, not point-and-click. Run tests, previews, and CI checks just like you do with infrastructure.
โ Mistake 5: Ignoring the Lifecycle
You onboarded the bot, but who owns it now? When does it expire? What if its creator left the company last quarter?
Without lifecycle management, NHIs become zombie processes โ still running, still privileged, and completely unaccounted for.
Fix: Set clear ownership. Add expiry and review dates. Kill unused identities by default.
The Bottom Line
You canโt secure modern infrastructure with yesterdayโs assumptions.
And you definitely canโt scale automation if youโre duct-taping bot accounts to human auth systems.
Non-human identities are exploding โ and they need their own layer of identity, access, and governance.