Non-human identities like service accounts, API keys, and machine tokens now outnumber human ones in most systems. In 2025, OWASP released a new top 10 list highlighting the most critical security risks tied to NHIs. This blog unpacks each risk and provides clear, practical steps to reduce exposure.
Every system you build creates a shadow network of machine identities. API keys, service accounts, tokens, and SSH keys quietly authenticate and interact without oversight. These non-human identities (NHIs) now outnumber human ones, and many are forgotten.
Most teams don’t know how many exist. Fewer still know which ones are overprivileged, reused, or lingering long after they should have been revoked. And when one leaks, attackers move without asking questions.
OWASP’s new 2025 top 10 list of NHI security risks reveals how deep this hole already goes. This article unpacks each risk and shows how to stop your systems from bleeding access in the dark.
The OWASP top 10 isn’t a warning against using NHIs. It’s a guide developed by the Open Worldwide Application Security Project (OWASP), a nonprofit focused on improving software security. Each item highlights a pressing security risk tied to non-human identities, from access left open to secrets reused, to credentials exposed. What follows is a breakdown of the risks, what they look like in the wild, and how to shut them down before they spread.
Old tokens linger quietly in your systems, waiting to be misused. Maybe it belonged to a developer who left months ago. Perhaps it was tied to a deprecated service nobody touched again. Either way, it’s still active and still has access. One forgotten NHI is all it takes for an attacker to slip in undetected and move freely.
How to confront it:
An API key tucked into a config file. Database credentials pushed through Git. A token passed over Slack “just this once.” These things happen until someone notices too late. Leaked secrets open the door to full system compromise, allowing attackers to access sensitive data, escalate privileges, and move freely across restricted systems.
How to confront it:
Third-party tools often receive NHIs to integrate with internal systems, perform specific tasks, or pull data from production. But when one of those tools is compromised, the fallout spreads fast. A single exposed token can become a foothold, turning their breach into an internal one.
How to confront it:
Old authentication methods can stick around long after they’re safe. NHIs still relying on outdated techniques like basic authentication (Base64 encoded credentials) or static credentials expose systems. These weak entry points easily get bypassed, allowing attackers to slip past defenses.
How to confront it:
In the rush to deploy, permissions are often left wide open. NHIs created for testing or early development stages can end up with more access than needed, and those permissions quietly follow them into production. This overreach is one of the most common breakdowns in non-human identity security. If one of those identities is compromised, the blast radius is far greater than anyone expected.
How to confront it:
CI/CD pipelines rely on service accounts to deploy code, manage infrastructure, and trigger automated tasks across cloud environments. But when those accounts rely on hardcoded credentials stored in config files or exposed through logs, they become high-value targets. A single leaked key can bypass MFA, reach production, and undo months of solid security work.
How to confront it:
Secrets are meant to expire. But in many systems, credentials like API keys, tokens, and encryption keys live far longer than they should. Some don’t expire at all. Without strong security controls in place, these long-lived secrets are exposed, and attackers often get unlimited time to use them without setting off alarms.
How to confront it:
It’s common to reuse the same NHI across development, staging, and production. It’s also a mistake. A compromised key in a non-production environment can become a direct line to critical systems. Without isolation, even low-risk environments become attack surfaces.
How to confront it:
One breach quickly becomes many when the same NHI is used across multiple services or systems. An exposed token in one microservice can give attackers access to everything else it touches. Reuse might seem convenient, but it multiplies the blast radius.
How to confront it:
Non-human identities are meant for automation, not manual work. But when engineers start using them to bypass user controls or speed up tasks, it muddies the audit trail. It becomes harder to tell whether an action came from a script or a person, and harder to respond when something goes wrong.
How to confront it:
While OWASP outlined several risk factors, it does not imply throwing NHIs out the door. These identities are vital to how modern systems operate. With proper secrets management techniques in place, their advantages outweigh the risks. Adopting the mitigation strategies outlined earlier is a path every organization serious about risk management should take.
However, using secrets management tools is only one part of securing NHIs. These identities should be treated with the same level of diligence as a company’s core products. As teams invest in training, tools, and processes to support product success, the same mindset should apply to managing non-human identities.
A robust approach includes inventory assessments, threat detection and response planning, zero trust principles, compliance enforcement, security training for staff, and clearly defined lifecycle policies. These practices help security teams control how NHIs are created, used, and decommissioned.
It shouldn’t be a one-time effort. NHI security should become part of the company culture. That means setting up regular strategy reviews, monitoring and auditing activity, and running frequent threat assessments to confirm that NHIs remain safe for organizations’ systems and data.
Removing NHIs from modern systems is like removing payment gateways from digital businesses today. It can’t be done. Just as risks are actively managed in the latter, the same level of care must be applied to the former.
Teams must define structured policies, train their people, and adopt the right tools to reduce the risks tied to NHIs using OWASP’s comprehensive list as a guide. Delays come at a cost, and the time to act is now.
Centralized secrets management plays a critical role among these strategies. Choosing a tool that addresses these risks through secure storage, automated rotation, access controls, logging, and auditing is essential. That’s why many teams choose Doppler as their single source of truth for managing secrets. Here’s how to get started.
Non-human identities (NHIs) are credentials used by systems, services, or scripts instead of people. This includes API keys, service accounts, machine tokens, and SSH keys that automate tasks and authenticate access across environments.
Trusted by the world’s best DevOps and security teams. Doppler is the secrets manager developers love.