In today’s AI-driven, fast-evolving software landscape, Non-Human Identities (NHIs) have become essential. They have also become a growing target for cyberattacks. Throughout 2024 and in the first quarter of 2025, saw an alarming increase in high profile NHI attacks, culminating in the breach of the U.S. Treasury’s network, exposed secrets in DeepSeek, and other high profile incidents. We can expect this trend to continue and see the number of attacks continue to rise throughout 2025. Building a robust identity security management strategy for NHIs has become an urgent priority for many organizations.
The OWASP Non-Human Identity Top 10 list provides a familiar framework and methodology to help security practitioners assess and quantify NHI-related risks. By leveraging this resource, security practitioners that may be new to identity security or NHI threats can better understand and compare these emerging risks with more traditional security issues.
In this article, I’ll break down the OWASP Top 10 for NHI, share my own perspective on each point, and suggest how you can integrate these insights into your broader identity security program.
Non-Human Identities (NHIs) are digital identities utilized by software entities such as AI Agents, applications, APIs, bots, and automated systems to access secured resources. Unlike human identities, NHIs operate autonomously and are not directly controlled by individuals. They establish a trusted relationship between machines and the resources they interact with, ensuring secure and seamless operations within digital infrastructures. Common examples include:
NHIs typically rely on a set of supporting security constructs to facilitate their access and interactions across systems. These include:
NHIs and their related accounts, credentials, and entitlements, are essential for the seamless automation and interoperability of modern software, but they also introduce unique security challenges that must be addressed to protect your digital infrastructure.
The Open Web Application Security Project (OWASP) is a nonprofit foundation dedicated to improving the security of software. They are best known for their widely adopted OWASP Top 10 lists for web applications and mobile applications, which highlight the most critical security risks based on real-world data and consensus among security professionals. OWASP’s risk-rating methodology revolves around four main factors: Prevalence (“how common is this vulnerability?”), Exploitability (“how easy is it to exploit this vulnerability?”), Detectability (“how easy is it to detect the presence of this vulnerability?”), and Impact (“what is the effect on the application, data, or business if the vulnerability is exploited?”). One of the advantages of this risk-rating methodology is that it’s consistent across different domains, giving security practitioners a common taxonomy to compare security risks in web applications, mobile applications, and now NHIs.
The “OWASP Top 10 for NHI” extends OWASP’s proven methodology of identifying and categorizing critical security risks into the realm of Non-Human Identities. As a first-year publication, we can expect it to evolve as new threats emerge and the nature of attacks changes. Although it’s not an exhaustive list of every possible NHI risk, it highlights the most prevalent and pressing security issues, supported by both real-world exploitation data and consensus among security experts.
Key Benefits:
The OWASP Top 10 for NHI covers many of the “usual suspects,” such as NHI1:2025 Improper Offboarding, NHI2:2025 Secret Leakage, NHI5:2025 Overprivileged NHI, NHI7:2025 Long-Lived Secrets, and other top risks. You can find the full list here.
However, beyond these top risk factors, there are a few overarching themes worth highlighting:
The OWASP Top 10 for NHI is poised to become a go-to framework for identifying and mitigating the distinct security risks associated with Non-Human Identities. In parallel, we can expect new, more specialized guidelines—much like how PCI-DSS continues to evolve—to address the unique needs of NHIs. By familiarizing yourself with this list, you can stay one step ahead of emerging threats and help ensure a more secure, resilient digital environment for your organization.
Take Action:
Saviynt Identity Cloud for Non-Human Identities
Saviynt’s Identity Cloud supports organizations as they race to address the emerging risks outlined in the OWASP Top 10 for NHI. Saviynt provides a unified, identity-centric platform that extends governance and access controls beyond human users to include machine identities, service accounts, and other NHIs. Features like automated discovery of NHIs, policy-based access controls, continuous risk scoring, and lifecycle management help organizations to reduce the risk of overprovisioned, orphaned, or long-lived secrets associated with NHIs.
Saviynt integrates seamlessly across hybrid and multi-cloud environments, enabling real-time visibility and intelligent remediation for both human and non-human identities. By aligning with OWASP’s best practices and leveraging AI-driven insights, Saviynt empowers enterprises to manage NHI sprawl, improve compliance, and secure their identity perimeter in an increasingly decentralized and automated digital ecosystem. Learn more.