Non-Human Identity

Learn latest technology and knowledge

CNI security

Securing Workloads with Container Network Interface (CNI) in a Non-Human Identity Context

Learn how to secure container workloads using CNI in the context of Non-Human Identities, machine identities, and workload identities. Explore best practices and challenges.

By AbdelRahman Magdy 11 min read
Read full article
SPIFFE

SPIFFE and SPIRE: Securing Non-Human Identities in Modern Workloads

Learn how SPIFFE and SPIRE provide a secure and scalable framework for managing non-human identities (NHIs) in cloud-native environments, enhancing zero-trust security.

By AbdelRahman Magdy 12 min read
Read full article
workload identity

Workload Identity Mutation: Understanding and Mitigating Risks in Non-Human Identities

Explore the risks of workload identity mutation, including privilege escalation and lateral movement. Learn mitigation strategies for securing non-human identities.

By AbdelRahman Magdy 12 min read
Read full article
workload identity

Dynamic Trust for Workloads: Securing Non-Human Identities in the Zero Trust Era

Explore dynamic trust for workloads, a critical component of Non-Human Identity security. Learn how to implement zero trust principles for machine identities.

By AbdelRahman Magdy 11 min read
Read full article
non-human identity

Non-Human Identity Brokering: Securely Managing Machine Identities

Explore non-human identity brokering, its importance in modern security, and how it helps manage machine identities, workload identities, and API access.

By Lalit Choda 10 min read
Read full article
workload identity isolation

Securing Workloads with Identity Isolation: A Zero Trust Approach

Learn how workload identity isolation strengthens security in zero trust architectures by protecting non-human identities and minimizing the blast radius of potential breaches.

By Lalit Choda 12 min read
Read full article
machine identity revocation

Machine Identity Revocation: A Comprehensive Guide

Learn about machine identity revocation, why it's crucial for Non-Human Identities (NHIs), and how to implement effective revocation strategies.

By Lalit Choda 12 min read
Read full article
machine identity

Securing Non-Human Identities with Machine Identity Proof-of-Possession

Learn how Machine Identity Proof-of-Possession (PoP) enhances security for Non-Human Identities (NHIs) by binding access tokens to specific machines, preventing unauthorized access and token theft.

By Lalit Choda 13 min read
Read full article
Non-Human Identity

Unveiling the Non-Human Identity Mesh: Securing the Future of Workload Identities

Explore the concept of a Non-Human Identity Mesh, its importance in securing machine and workload identities, and how it addresses the challenges of modern, complex IT environments.

By AbdelRahman Magdy 11 min read
Read full article