Evan Gilman, Pieter Kasselman, and Marcel Levy
January 16, 2025
The Open Worldwide Application Security Project (OWASP) is a great resource for understanding computer security risks and best practices. They recently published a "Non-Human Identities Top 10" list of risks. It's best seen as a picture of where the industry has been, rather than where it's going, and it blurs the line between secrets and identities.
To understand non-human identities (NHI’s), we need to clear up some confusion. Secrets are not identities. As Eli Nestorov points out, identities are built on standards. In these standards, identities have credentials, and their lifetimes are enforced.
Take SPIFFE for example, where credentials are short-lived, automatically managed and disposable. These credentials are provisioned onto workloads and hosts for as long as they need it – and no longer. With an NHI identity provider based on open standards, we see that most of the risks mentioned in the OWASP list don't apply, because they are inherent to shared secrets and not identity credentials. For example:
In fact, a whopping 80% of Top 10 OWASP NHI threats are either mitigated or completely eliminated by leveraging true identity-centric NHI technologies. Notice the abundance of conversation about long-lived secrets, API keys, service accounts and improper storage. None of these exist in environments that have deployed an NHI identity provider like SPIRL. This mess has been created by the improper use of legacy, human-centric authentication technologies in the non-human domain. But that's where we've been as an industry in the past, and not where we are – or where we’re going… Remember - secrets are not identities, and identities are not secrets.
SPIRL uses open standards to unify fragmented workload identities across all your environments. Learn more.