Article

OWASP NHI3:2025 - Vulnerable Third-Party NHI

Discover the security risks of vulnerable third-party non-human identities (NHI3:2025) and learn effective strategies to protect your organization from this OWASP Top 10 threat.

In today’s interconnected digital world, enterprises rely heavily on a vast ecosystem of third-party services and integrations to streamline operations and drive innovation. These integrations often involve the exchange of sensitive data and grant access to critical systems through non-human identities (NHIs). While these connections offer immense benefits, they also introduce significant security risks—particularly regarding vulnerable third-party NHIs, recognized as NHI3:2025 in the OWASP Non-Human Identities (NHI) Top 10. Understanding this threat is crucial for strengthening your organization’s security posture.

What Is a Vulnerable 3rd Party NHI?

Third-party NHIs are the digital credentials used by external applications, services, or integrations to access resources within your environment. These can range from integrated development environments (IDEs) and their extensions to various third-party SaaS applications connected to your systems.

NHI3:2025 – Vulnerable 3rd Party NHI occurs when these third-party components or their associated NHIs become compromised. This can happen due to several factors, such as:

• Security vulnerabilities within the third party’s own systems or software

• Malicious updates or backdoors introduced by threat actors targeting the third party

• Misconfigurations or weak security practices on the third party’s end

Why Should You Be Concerned? The Impact of Compromised 3rd Party NHIs

The compromise of a third-party NHI can have severe consequences for your organization. Because these identities are often deeply integrated into development workflows and operational processes, attackers can exploit them to:

Steal sensitive credentials – If a third-party IDE extension is compromised, attackers could steal internal NHIs or misuse the permissions granted to them.

Gain unauthorized access to critical systems and data – Once attackers control a third-party NHI with sufficient permissions, they can pivot into internal resources, potentially accessing customer data, intellectual property, or critical infrastructure.

Disrupt operations – By manipulating or disabling third-party integrations, attackers can disrupt essential business processes and impact productivity.

Launch supply chain attacks – Compromised third-party NHIs can serve as an entry point for broader supply chain attacks, allowing attackers to infiltrate multiple organizations reliant on the same vulnerable third-party service.

The interconnected nature of modern systems means that a vulnerability in even a minor third-party component can create a ripple effect, jeopardizing the security of your entire enterprise.

Real-World Examples Highlighting the Risk

While no specific third-party NHI breaches are detailed in available sources, the inclusion of this threat in the OWASP NHI Top 10 underscores its reality. Consider these plausible scenarios:

• A popular code analysis tool used in your CI/CD pipeline is breached. Attackers gain access to API secrets the tool uses to interact with your code repositories, allowing them to inject malicious code.

• A third-party marketing automation platform connected to your customer database has a vulnerability. Attackers exploit this to steal OAuth secrets used for integration, gaining access to sensitive customer information.

• A seemingly innocuous browser extension used by developers is compromised, enabling attackers to harvest API keys and secrets stored in local development environments.

These scenarios illustrate how vulnerabilities in third-party NHIs can bypass direct security controls, leading to potentially devastating breaches.

Best Practices for Mitigating Vulnerable 3rd Party NHI Risks

Protecting your organization from vulnerable third-party NHIs requires a proactive, multi-layered approach:

1. Thoroughly vet third-party vendors – Before integrating any third-party application or service, conduct a comprehensive security assessment. Evaluate their security policies, incident response plans, and history of security incidents.

2. Apply the principle of least privilege – Grant third-party NHIs only the minimum level of access required for their function. Avoid overly broad permissions that could be exploited if compromised.

3. Implement robust monitoring and alerting – Continuously monitor third-party NHI activity for anomalies. Set up alerts for unusual access patterns, privilege escalations, or access attempts from unexpected locations.

4. Regularly review and audit third-party access – Periodically review third-party integrations and their granted permissions. Remove any that are no longer necessary or do not meet security standards.

5. Enforce strong authentication for internal systems – While you can’t control third-party security directly, ensuring strong authentication within your own environment can limit potential damage if a third-party NHI is compromised.

6. Utilize Non-Human Identity Management solutions – Platforms like Cremit provide unified visibility into all NHIs, including those from third parties. Cremit’s Identity Traceability helps map the origin, owners, and access of these identities, enabling better risk assessment and mitigation.

Conclusion: Securing Your Extended Digital Enterprise

Vulnerable third-party NHIs represent a significant and often overlooked threat in today’s digital landscape. As organizations increasingly rely on external integrations, it is imperative to extend security measures beyond internal perimeters to include third-party partners and their associated NHIs.

By understanding the risks outlined in OWASP NHI Top 10’s NHI3:2025 and implementing proactive security measures, you can significantly reduce exposure to attacks and strengthen your overall security posture. Ignoring this hidden danger leaves your organization vulnerable to sophisticated cyber threats with potentially severe consequences.

Unlock AI-Driven Insights to Master Non-Human Identity Risk.

Go beyond basic data; unlock the actionable AI-driven insights needed to proactively master and mitigate non-human identity risk

A dark-themed cybersecurity dashboard from Cremit showing non-human identity (NHI) data analysis. Key metrics include “Detected Secrets” (27 new) and “Found Sensitive Data” (58 new) from Jan 16–24, 2024. Two donut charts break down source types of detected secrets and sensitive data by platform: GitHub (15k), GetResponse (1,352), and Atera (352), totaling 16.9k. The dashboard includes a line graph showing trends in sensitive data over time, and bar charts showing the top 10 reasons for sensitive data detection—most prominently email addresses and various key types (API, RSA, PGP, SSH).

Blog

Explore more news & updates

Stay informed on the latest cyber threats and security trends shaping our industry.

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Deep dive into OWASP NHI5 Overprivileged NHIs & AI. Learn causes, risks, detection, and mitigation strategies like CIEM, PaC, and JIT access.
Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Traditional NHI controls like rotation aren't enough. Discover why proactive, continuous secret detection is essential for securing modern infrastructure.
OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Deep dive into OWASP NHI4: Insecure Authentication. Understand the risks of NHIs, key vulnerabilities, and how Zero Trust helps protect your systems.
Secret Sprawl and Non-Human Identities: The Growing Security Challenge
Discover NHI sprawl vulnerabilities and how Cremit's detection tools safeguard your organization from credential exposure. Learn to manage NHI risks.
Navigating the Expanding AI Universe: Deepening Our Understanding of MCP, A2A, and the Imperative of Non-Human Identity Security
Delve into AI protocols MCP & A2A, their potential security risks for AI agents, and the increasing importance of securing Non-Human Identities (NHIs).
Stop Secrets Sprawl: Shifting Left for Effective Secret Detection
Leaked secrets threaten fast-paced development. Learn how Shift Left security integrates early secret detection in DevOps to prevent breaches & cut costs.
Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical
Learn critical strategies for detecting secrets in S3 buckets. Understand the risks of exposed NHI credentials & why proactive scanning is essential.
OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks
NHI2 Secret Leakage: Exposed API keys and credentials threaten your business. Learn how to prevent unauthorized access, data breaches, and system disruption.
Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection
Cremit Launches AWS S3 Non-Human Identity (NHI) Detection to Boost Cloud Security
Human vs. Non-Human Identity: The Key Differentiators
Explore the critical differences between human and non-human digital identities, revealing hidden security risks and the importance of secret detection.
Wake-Up Call: tj-actions/changed-files Compromised NHIs
Learn from the tj-actions/changed-files compromise: CI/CD non-human identity (NHI) security risks, secret theft, and proactive hardening.
OWASP NHI3:2025 - Vulnerable Third-Party NHI
Discover the security risks of vulnerable third-party non-human identities (NHI3:2025) and learn effective strategies to protect your organization from this OWASP Top 10 threat.
Build vs. Buy: Making the Right Choice for Secrets Detection
Build vs. buy secrets detection: our expert guide compares costs, features, and ROI for in-house and commercial security platforms.
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Bybit hacked! $1.4B crypto currency stolen! Exploited Safe{Wallet}, API key leak, AWS S3 breach? Exchange security is at stake! Check your security now!
Rising Data Breach Costs: Secret Detection's Role
Learn about the growing financial impact of data breaches and how secret detection and cybersecurity strategies can safeguard your data and business.
OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview
Discover how improper offboarding exposes credentials, leading to vulnerabilities like NHI sprawl, attack surface expansion, and compliance risks.
Behind the Code: Best Practices for Identifying Hidden Secrets
Improve code security with expert secret detection methods. Learn strategies to safeguard API keys, tokens, and certificates within your expanding cloud infrastructure.
Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats
Understanding NHI OWASP Top 10: risks to non-human identities like APIs and keys. Covers weak authentication, insecure storage, and more.
Securing Your Software Pipeline: The Role of Secret Detection
Prevent secret leaks in your software pipeline. Discover how secret detection improves security, safeguards CI/CD, and prevents credential exposure.
What Is Secret Detection? A Beginner’s Guide
Cloud security demands secret detection. Learn its meaning and why it's essential for protecting sensitive data in today's cloud-driven organizations.
Full Version of Nebula – UI, New Features, and More!
Explore the features in Nebula’s full version, including a refined UI/UX, fine-grained access control, audit logs, and scalable plans for teams of all sizes.
Unveiling Nebula: An Open-Source MA-ABE Secrets Vault
Nebula is an open-source MA-ABE secrets vault offering granular access control, enhanced security, and secret management for developers and teams.
Vigilant Ally: Helping Developers Secure GitHub Secrets
The Vigilant Ally Initiative supports developers secure API keys, tokens, and credentials on GitHub, promoting secure coding and secrets management.
Cremit Joins AWS SaaS Spotlight Program
Cremit joins the AWS SaaS Spotlight Program to gain insights through mentorship and collaboration, driving innovation in AI-powered security solutions.
DevSecOps: Why start with Cremit
DevSecOps is security into development, improving safety with early vulnerability detection, remediation, and compliance, starting with credential checks.
Credential Leakage Risks Hiding in Frontend Code
Learn why credentials like API keys and tokens are critical for access control and the risks of exposure to secure your applications and systems effectively.
Introducing Probe! Cremit's New Detection Engine
Probe detects exposed credentials and sensitive data across cloud tools, automating validation and alerts, with AI-powered scanning for enhanced security.
Customer Interview: Insights from ENlighten
We interviewed Jinseok Yeo from ENlighten, Korea’s top energy IT platform, on how they secure credentials and secrets. Here’s their approach to security.
6 Essential Practices for Protecting Non-Human Identities
Safeguard your infrastructure: Learn 6 best practices to protect API keys, passwords & encryption keys with secure storage, access controls & rotation.
Microsoft Secrets Leak: A Cybersecurity Wake-Up Call
See how an employee error at Microsoft led to the exposure of sensitive secrets and 38 terabytes of data.