CSAIChaptersEventsBlog
Join the June 2 webinar to learn how AI-driven threats are reshaping enterprise security and what teams can do to stay ahead. Register now →
Open Peer Review Tag

Defining Non-Human Identity

Open Until: 06/04/2026

Identity and Access Management

Defining Non-Human Identity
Conventional IAM processes have a user-centric nature, that is, the users considered include the employees, those on contract and partners whose operations are easily monitored and regulated. The inherent problem with the traditional IAM systems is that they were not created to support the scale, independence, and intricacy of NHIs. However, NHIs are managed on a scale and in an environment (e.g., cloud, containerized infrastructure) that makes these more traditional models ineffective (NIST, 2020). These identities can be spanning across the cloud environments, on-premises systems, and legacy infrastructure and may lack a clear ownership, defined lifecycle management, or a strong security measure in place (KuppingerCole Analysts AG, n.d.). Moreover, NHI automation of its provisioning and decommissioning, necessary to make it efficient, adds new complexity and risks, which need to be mitigated with the help of thorough governance (Cloud Security Alliance, 2024).

Contribute to Peer Review

Peer Review Agreement

By participating in this peer review, you acknowledge and agree to the following:

  • Your name will be included as a reviewer only if you provide substantive feedback (e.g., content, clarity, accuracy). Feedback limited to grammar, syntax, or formatting will not qualify for acknowledgement.
  • CSA's authors will have final discretion over which suggestions are incorporated into the document. Not all feedback will be implemented.
  • You will not plagiarize or submit unmodified AI-generated text. If using AI-generated content, you must apply your expertise to refine, reformat, or integrate it meaningfully into the document.
Peer Review Illustration

Open Until: 06/04/2026

Featured by CSA

Want to see your content featured here?

Contact us to learn more!

Explore More of CSA

Research & Best Practices

Stay informed about the latest best practices, reports, and solutions in cloud security with CSA research.

Upcoming Events & Conferences

Stay connected with the cloud security community by attending local events, workshops, and global CSA conferences. Engage with industry leaders, gain new insights, and build valuable professional relationships—both virtually and in person.

Training & Certificates

Join the countless professionals who have selected CSA for their training and certification needs.

Industry News

Stay informed with the latest in cloud security news - visit our blog to keep your competitive edge sharp.