What You’ll Learn
⏱️ 12 min read
Non-Human Identity Security — 2026 Guide
Non-human identity security is one of the fastest-moving areas in enterprise security in 2026 because the problem is growing faster than tools can manage it. It is the identity layer of the agentic AI attack surface I covered earlier. The excessive permissions problem (OWASP LLM08) is the direct consequence of the IAM gaps described here. The SAIF framework Principle 4 specifically addresses harmonising controls for non-human actors.
What Non-Human Identity Is
Non-human identities (NHIs) are credentials and access tokens used by automated systems rather than humans — service accounts, API keys, OAuth tokens, machine certificates, and the authentication credentials used by AI agents. My working estimate from security assessments — and this figure consistently surprises security leaders: for every human user identity in a large enterprise, there are typically 10–45 non-human identities. Most of them are undocumented, many are significantly overprivileged, and a considerable proportion are completely unmonitored with no active owner accountable for their use.
How AI Agents Break IAM
Traditional IAM was designed around three assumptions that AI agents violate. My framework for why conventional identity management approaches fail for AI agent identities.
Five Categories of NHI Risk
Inventorying Non-Human Identities
My starting point for any NHI security engagement: the inventory. You cannot manage what you cannot see, and most organisations significantly underestimate how many non-human identities exist in their environment. My experience: discovery exercises typically find 3–5x more NHIs than the security team estimated.
The agent: reads emails, creates support tickets in Jira, sends email responses.
1. IDENTITY CREATION
What type of identity should the agent use?
(Service account? OAuth app? Managed identity?)
What naming convention identifies it as an AI agent? (e.g., svc-ai-support-agent)
2. PERMISSION SCOPING
What is the minimum set of permissions needed for the three functions?
(Read emails: what scope? Create Jira tickets: which projects? Send emails: to whom?)
What permissions should be explicitly DENIED?
3. CREDENTIAL MANAGEMENT
How are the agent’s credentials stored? (secret manager, not env file)
How often are they rotated?
Who has access to the credentials?
4. MONITORING
What actions by this agent should be logged?
What anomalous behaviour would you alert on?
Who reviews the agent’s action log?
5. LIFECYCLE
What triggers decommissioning of this agent?
Who is the owner? What happens when they leave?
Output: a one-page AI agent identity policy for this specific agent.
The AI Agent Identity Framework
Real Attack Scenarios — When NHI Governance Fails
My framing for security teams that want to understand NHI risk concretely rather than abstractly: the following scenarios are not hypothetical. They’re composites of patterns I’ve encountered across security assessments. Each one is enabled specifically by one of the five NHI risk categories.
Non-Human Identity — Key Points
NHI Security — Start the Inventory
Run an NHI inventory this week across your cloud IAM, code repositories, and by surveying development teams about deployed agents. The inventory result will define your programme priorities — and it will almost certainly reveal more NHIs than your team estimated, which is itself valuable risk intelligence. For the agent permission scoping layer, the Agentic AI Security guide has the blast radius framework.
Quick Check
Frequently Asked Questions
What is a non-human identity?
Why are AI agents a special identity management problem?
How do I start managing non-human identity security?
Agentic AI Security 2026
Google SAIF — AI Security Programme
Further Reading
- Agentic AI Security 2026 — The attack surface context for NHI. The CyberStrikeAI incident and how excessive agent permissions compound with prompt injection to create catastrophic blast radius.
- MCP Server Security 2026 — The tool layer identity risk. MCP servers authenticate with the same identity as the AI agent — a compromised MCP server inherits all agent credentials.
- Gartner — Top Cybersecurity Trends 2026 — The primary source for NHI being a top-priority 2026 trend, with Gartner’s IAM adaptation recommendations for AI agent identity management.

