NHI Foundation Level Training Course Launched
NHI Forum

Notifications
Clear all

Non-Human Identity Security in Q3 2025: Trends, Risks, and Recommendations


(@gitguardian)
Estimable Member
Joined: 9 months ago
Posts: 46
Topic starter  

Read full article here: https://blog.gitguardian.com/q3-2025-nhi-security-gets-more-real/?utm_source=nhimg

 

Many organizations overlook a critical attack surface: developers’ personal GitHub repositories. A leaked service account credential on a personal project can be as dangerous—or more so—than an internal exposure.

With Q3 2025 updates, Public Monitoring is now fully integrated into the GitGuardian platform, unifying Internal Monitoring, Public Monitoring, and NHI Governance. This integration delivers cross-product intelligence, allowing security teams to see how publicly exposed secrets relate to internal incidents, vaulted credentials, infrastructure, and consumer applications—all in one interface.

Key benefits of the unified platform:

  • Single dashboard for all incidents across internal and public sources
  • Unified triage workflows and severity scoring
  • Integrated remediation playbooks for faster, consistent response

This proactive integration enables scanning of your public perimeter to detect exposed secrets before attackers do, addressing one of the fastest-moving threat vectors in today’s cloud-first, AI-driven environments.

 

Closing the Attack Window: One-Click Secret Revocation

Exposed AWS credentials can be probed in under 17 minutes. Traditional manual remediation is far too slow, leaving secrets vulnerable.

With the Q3 update, GitGuardian now allows one-click revocation directly from the incident detail view, eliminating context switching, manual dashboard hunting, and long delays.

Workflow highlights:

  1. Detect valid secret exposure
  2. Assess impact using NHI Governance context (consumer applications, accessible resources, dependent workloads)
  3. Decide: immediate revocation or coordinated response
  4. Execute safely with automated compliance logging

Supported platforms include GitHub, GitLab, and OpenAI, with more integrations coming to enable rapid, automated secret revocation across environments.

During alpha testing, 40% of users adopted the feature immediately, demonstrating high demand for fast threat neutralization.

 

Making Investigation Intuitive: Secrets Exploration Graph

Investigating secret exposure no longer requires cross-referencing multiple tools. GitGuardian introduces a context-rich exploration graph, showing:

  • Severity levels and source information
  • Occurrence data
  • Public leak indicators

Integrated HasMySecretLeaked intelligence categorizes exposures into:

  1. Monitored public sources
  2. Public perimeter incidents
  3. External GitHub locations

This unified view provides full visibility of Non-Human Identities (NHIs), which are particularly vulnerable to sprawl due to long lifetimes, hard-coded credentials, and multi-location usage. The graph helps teams understand, prioritize, and remediate exposures efficiently.

 

Expanding the Ecosystem: 12 New Integrations

Q3 2025 saw GitGuardian launch 12 new integrations, covering:

  • Identity & Security: Okta, Auth0, JFrog
  • Observability: Datadog, New Relic
  • Data & Analytics: Snowflake, Metabase
  • AI Platforms: OpenAI, Anthropic, Dust
  • Automation: N8N, Airbyte

These integrations expand visibility into service accounts, API keys, automated jobs, AI agent workflows, and orchestration tools, centralizing previously hidden NHIs in a single platform inventory.

The underlying framework allows rapid, reusable integration development, paving the way for exponential ecosystem growth in Q4 and beyond.

 

Rethinking NHI Navigation: Identity-First Inventory

GitGuardian introduced an identity-first inventory view, flipping the traditional source-first approach. Key benefits:

  • Discover NHI sprawl across systems
  • Assess blast radius of compromised identities
  • Track lifecycle from creation to decommissioning
  • Prioritize remediation based on privilege and access

This approach directly addresses OWASP’s NHI Top 10 risks, including inadequate visibility and lack of lifecycle management, making identities and secrets the primary unit of analysis.

 

Staying Ahead of the Credential Arms Race

The detection engine evolved with 30+ new detectors and updates to 50+ existing ones, covering:

  • AI platforms: Mistral AI, Anthropic, Perplexity
  • Cloud services: Artifactory, GitLab
  • Kubernetes clusters
  • Development tools: Buildkite

Continuous updates ensure emerging credential types are detected before attackers exploit them. Security teams are encouraged to re-scan repositories and other sources to uncover previously unknown exposures.

 

What’s Next: Q4 Roadmap

GitGuardian continues to focus on:

  1. Expanded Remediation Automation: Automated code fix generation, PR suggestions, advanced playbooks, and vault-integrated secret rotation
  2. Deeper Integrations: Multi-cloud NHI discovery, CI/CD pipeline prevention, extended secrets manager support
  3. Enhanced Intelligence & Analytics: Predictive risk detection, compliance framework mapping, and threat correlation

The platform ensures teams stay ahead in the race to secure Non-Human Identities, combining visibility, automation, and actionable intelligence.

 



   
Quote
Topic Tags
Share: