Article

Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats

Understanding NHI OWASP Top 10: risks to non-human identities like APIs and keys. Covers weak authentication, insecure storage, and more.

In a rapidly changing digital environment, Non-Human Identities (NHIs) are becoming increasingly critical to application development. NHIs, which include service accounts, API keys, and other non-human digital identities, enable secure device-to-device and human-to-device access. However, the proliferation of NHIs creates new security challenges. To help address these risks, the Open Web Application Security Project (OWASP) has published a Top 10 list that describes the most critical vulnerabilities related to Non-Human-Identities (NHI). In this article, we'll explore the key concepts in the OWASP NHI Top 10 and explain why understanding these risks is essential for modern application development.

What Are Non-Human Identities?

NHIs help developers build applications by providing various types of digital identities, such as service accounts, service principals, IAM users, roles, and applications. These IDs are used to ensure secure access within modern systems. With the increasing adoption of microservices, third-party solution integrations, cloud environments, and CI/CD pipelines, the number of NHIs has grown exponentially—they now outnumber human IDs by as much as 20 to 1. This massive proliferation creates an expansive attack surface, making NHIs a prime target for malicious actors.

OWASP Non-Human Identities Top 10 - 2025

The OWASP NHI Top 10 is a list of the most severe security risks and vulnerabilities related to Non-Human Identities. The vulnerabilities are ranked based on factors such as exploitability, prevalence, detectability, and impact. The goal of this project is to help security professionals better understand the NHI attack surface and threat scenarios so that they can protect and manage these identities more effectively.

Below is a summary of the OWASP NHI Top 10 - 2025:

NHI1:2025 - Improper Offboarding: Improper deactivation or removal of a Non-Human Identity, such as service accounts and access keys, when they are no longer needed. If associated NHIs are not properly removed, unmonitored services can be exploited by attackers.

NHI2:2025 - Secrets Leakage: Involves the exposure of critical NHIs, such as API keys and tokens, in unauthorized data repositories such when they are hard-coded in source code. Cremit helps effectively detect and remove exposed secrets from source code, collaboration tools, and cloud storage environments.

NHI3:2025 - Vulnerable Third-Party NHIs: Third-party NHIs are widely integrated into development workflows. If a third-party extension is compromised, attackers can exploit it to steal credentials or abuse granted privileges.

NHI4:2025 - Insecure Authentication: Involves the use of outdated or vulnerable authentication methods that can expose an organization to serious risks.

NHI5:2025 - OverPrivileged NHIs: Occurs when an NHI is granted more privileges than necessary, allowing attackers to abuse these excessive permissions if the NHI is compromised.

NHI6:2025 - Insecure Cloud Deployment Configurations: Includes scenarios where static credentials are exposed in CI/CD applications, potentially granting attackers persistent access to production environments. Cremit provides an integrated tool to detect and eliminate secrets exposed within CI/CD pipelines.

NHI7:2025 -  Logn-Lived Secrets: Using secrets that never expire or have very long expiration dates gives attackers a longer window of opportunity. 

NHI8:2025 - Environment Isolation: Reusing the same NHI in multiple environments, especially between test and production, creates a serious security vulnerability.

NHI92025 - NHI Reuse: When the same NHI is reused across different applications and services, a compromise in one area can allow attackers to gain unauthorized access to other parts of the system.

NHI10:2025 - Human Use of NHIs: Misusing NHIs for manual tasks that should be performed with human identities introduces risks such as privilege escalation and lack of audit.

Why Is the OWASP NHI Top 10 Important?

The Open Web Application Security Project (OWASP) NHI Top 10 highlights the threats associated with managing NHIs. Unlike human credentials, NHIs are often created by developers without a centralized management system. Their dynamic nature makes it difficult to manage and protect them using traditional IAM tools. Risks associated with unmanaged NHIs include account compromise, secret exposure, and unauthorized access. Understanding the risks and vulnerabilities identified in the OWASP NHI Top 10 is a crucial step for organizations to effectively manage and protect NHIs, thereby preventing breaches and ensuring the security of their applications.

How You Can Contribute

OWASP encourages community involvement in the development and promotion of the NHI Top 10. You can contribute in various ways:

  • Providing data on vulnerability prevalence
  • Translating the list into non-English languages (Cremit is working on providing a Korean translation to OWASP)
  • Reviewing and suggesting improvements
  • Providing real-world case examples

The OWASP NHI Top 10 is a vital resource for developers and security professionals aiming to understand and mitigate the risks associated with NHIs. By recognizing these risks and implementing recommended security practices, organizations can better protect their applications and data from potential breaches. This list provides valuable insights and actionable steps for any organization looking to strengthen its security posture in the face of increasing NHI usage.

Are You Managing Your NHIs Properly?

NHI, such as service accounts, API keys, and OAuth tokens, are essential to application development. However, if these NHIs are not managed properly, they can be easy prey for malicious actors. In fact, many websites have secret keys exposed indiscriminately, which is a huge threat. The NHI Top 10, published by the Open Web Application Security Project (OWASP), warns of this risk. Improper offboarding, secret leakage, vulnerable third-party NHI, insecure authentication, and other vulnerabilities may be endangering your system.

Cremit has you covered!

Cremit helps you secure your systems against these NHI-related security threats.

  • Uncover hidden secrets: Cremit finds API keys, tokens, credentials, and more hidden in your code, configuration files, Git history, and more to eliminate the risk of leaks.
  • Save time with automated scans: Manually scanning for NHI is time-consuming and error-prone. Cremit automated scans quickly and accurately find vulnerabilities, saving you valuable time.
  • Seamless integration with DevSecOps: Cremit easily integrates into your CI/CD pipeline to help you identify and remediate security vulnerabilities from the earliest stages of development.
  • Tailored solutions: Cremit provides customized solutions to fit your environment and requirements, helping you build the optimal security environment.

Don't suffer from NHI security issues any longer. Try Cremit's demo experience and see for yourself! Let's create a secure digital world with Cremit!

Unlock AI-Driven Insights to Master Non-Human Identity Risk.

Go beyond basic data; unlock the actionable AI-driven insights needed to proactively master and mitigate non-human identity risk

A dark-themed cybersecurity dashboard from Cremit showing non-human identity (NHI) data analysis. Key metrics include “Detected Secrets” (27 new) and “Found Sensitive Data” (58 new) from Jan 16–24, 2024. Two donut charts break down source types of detected secrets and sensitive data by platform: GitHub (15k), GetResponse (1,352), and Atera (352), totaling 16.9k. The dashboard includes a line graph showing trends in sensitive data over time, and bar charts showing the top 10 reasons for sensitive data detection—most prominently email addresses and various key types (API, RSA, PGP, SSH).

Blog

Explore more news & updates

Stay informed on the latest cyber threats and security trends shaping our industry.

OWASP NHI5:2025 - Overprivileged NHI In-Depth Analysis and Management
Deep dive into OWASP NHI5 Overprivileged NHIs & AI. Learn causes, risks, detection, and mitigation strategies like CIEM, PaC, and JIT access.
Beyond Lifecycle Management: Why Continuous Secret Detection is Non-Negotiable for NHI Security
Traditional NHI controls like rotation aren't enough. Discover why proactive, continuous secret detection is essential for securing modern infrastructure.
OWASP NHI4:2025 Insecure Authentication Deep Dive Introduction: The Era of Non-Human Identities Beyond Humans
Deep dive into OWASP NHI4: Insecure Authentication. Understand the risks of NHIs, key vulnerabilities, and how Zero Trust helps protect your systems.
Secret Sprawl and Non-Human Identities: The Growing Security Challenge
Discover NHI sprawl vulnerabilities and how Cremit's detection tools safeguard your organization from credential exposure. Learn to manage NHI risks.
Navigating the Expanding AI Universe: Deepening Our Understanding of MCP, A2A, and the Imperative of Non-Human Identity Security
Delve into AI protocols MCP & A2A, their potential security risks for AI agents, and the increasing importance of securing Non-Human Identities (NHIs).
Stop Secrets Sprawl: Shifting Left for Effective Secret Detection
Leaked secrets threaten fast-paced development. Learn how Shift Left security integrates early secret detection in DevOps to prevent breaches & cut costs.
Hidden Dangers: Why Detecting Secrets in S3 Buckets is Critical
Learn critical strategies for detecting secrets in S3 buckets. Understand the risks of exposed NHI credentials & why proactive scanning is essential.
OWASP NHI2:2025 Secret Leakage – Understanding and Mitigating the Risks
NHI2 Secret Leakage: Exposed API keys and credentials threaten your business. Learn how to prevent unauthorized access, data breaches, and system disruption.
Stop the Sprawl: Introducing Cremit’s AWS S3 Non-Human Identity Detection
Cremit Launches AWS S3 Non-Human Identity (NHI) Detection to Boost Cloud Security
Human vs. Non-Human Identity: The Key Differentiators
Explore the critical differences between human and non-human digital identities, revealing hidden security risks and the importance of secret detection.
Wake-Up Call: tj-actions/changed-files Compromised NHIs
Learn from the tj-actions/changed-files compromise: CI/CD non-human identity (NHI) security risks, secret theft, and proactive hardening.
OWASP NHI3:2025 - Vulnerable Third-Party NHI
Discover the security risks of vulnerable third-party non-human identities (NHI3:2025) and learn effective strategies to protect your organization from this OWASP Top 10 threat.
Build vs. Buy: Making the Right Choice for Secrets Detection
Build vs. buy secrets detection: our expert guide compares costs, features, and ROI for in-house and commercial security platforms.
Bybit Hack Analysis: Strengthening Crypto Exchange Security
Bybit hacked! $1.4B crypto currency stolen! Exploited Safe{Wallet}, API key leak, AWS S3 breach? Exchange security is at stake! Check your security now!
Rising Data Breach Costs: Secret Detection's Role
Learn about the growing financial impact of data breaches and how secret detection and cybersecurity strategies can safeguard your data and business.
OWASP NHI1:2025 Improper Offboarding- A Comprehensive Overview
Discover how improper offboarding exposes credentials, leading to vulnerabilities like NHI sprawl, attack surface expansion, and compliance risks.
Behind the Code: Best Practices for Identifying Hidden Secrets
Improve code security with expert secret detection methods. Learn strategies to safeguard API keys, tokens, and certificates within your expanding cloud infrastructure.
Understanding the OWASP Non-Human Identities (NHI) Top 10 Threats
Understanding NHI OWASP Top 10: risks to non-human identities like APIs and keys. Covers weak authentication, insecure storage, and more.
Securing Your Software Pipeline: The Role of Secret Detection
Prevent secret leaks in your software pipeline. Discover how secret detection improves security, safeguards CI/CD, and prevents credential exposure.
What Is Secret Detection? A Beginner’s Guide
Cloud security demands secret detection. Learn its meaning and why it's essential for protecting sensitive data in today's cloud-driven organizations.
Full Version of Nebula – UI, New Features, and More!
Explore the features in Nebula’s full version, including a refined UI/UX, fine-grained access control, audit logs, and scalable plans for teams of all sizes.
Unveiling Nebula: An Open-Source MA-ABE Secrets Vault
Nebula is an open-source MA-ABE secrets vault offering granular access control, enhanced security, and secret management for developers and teams.
Vigilant Ally: Helping Developers Secure GitHub Secrets
The Vigilant Ally Initiative supports developers secure API keys, tokens, and credentials on GitHub, promoting secure coding and secrets management.
Cremit Joins AWS SaaS Spotlight Program
Cremit joins the AWS SaaS Spotlight Program to gain insights through mentorship and collaboration, driving innovation in AI-powered security solutions.
DevSecOps: Why start with Cremit
DevSecOps is security into development, improving safety with early vulnerability detection, remediation, and compliance, starting with credential checks.
Credential Leakage Risks Hiding in Frontend Code
Learn why credentials like API keys and tokens are critical for access control and the risks of exposure to secure your applications and systems effectively.
Introducing Probe! Cremit's New Detection Engine
Probe detects exposed credentials and sensitive data across cloud tools, automating validation and alerts, with AI-powered scanning for enhanced security.
Customer Interview: Insights from ENlighten
We interviewed Jinseok Yeo from ENlighten, Korea’s top energy IT platform, on how they secure credentials and secrets. Here’s their approach to security.
6 Essential Practices for Protecting Non-Human Identities
Safeguard your infrastructure: Learn 6 best practices to protect API keys, passwords & encryption keys with secure storage, access controls & rotation.
Microsoft Secrets Leak: A Cybersecurity Wake-Up Call
See how an employee error at Microsoft led to the exposure of sensitive secrets and 38 terabytes of data.