Skip to main content
NEW: RSAC 2026 NHI Field Report. How Non-Human Identity became cybersecurity's central axis
Threat patterns

What is Vulnerable Third-Party NHI?

Also known as: Third-Party NHI · Vendor API Key · OWASP NHI3

An NHI that belongs to a vendor or third-party integration — a Datadog API key, a Slack bot token, an OAuth grant to a SaaS app, a webhook secret. OWASP NHI3:2025 flags this because a breach on the vendor side (or a lost laptop holding their key) becomes your incident. Inventory, scope review, and rotation workflows on every third-party NHI are essential; most organizations have 10x more than they realize.

More terms in Threat patterns

Browse the full glossary

30 terms organized by category.