Podcast - Non-Human Identities - The Silent Risk In Cloud Security
Lalit Choda, founder of the Non-Human Identity Management Group, joins Nauman Mustafa for an episode of Access Granted by Britive, where they explore how and why Non-Human Identities have become a significant security risk and what organizations can do to address them.
Key discussion topics include:
What’s considered an NHI? Examples include API keys, service accounts, automations, and more.
How static credentials, secrets sprawl, and stale accounts create vulnerabilities and increase the attack surface. -
Practical steps for organizations, including scanning repos for hard-coded credentials, cycling tokens, and creating a full NHI inventory.
The importance of Zero Standing Privileges (ZSP) and just-in-time (JIT) access to securing NHIs without impeding developer agility.
The intersection of AI, NHIs, and security – and balancing innovation with robust protection
🎧 Listen to Access Granted on Spotify: https://open.spotify.com/show/7ukJOqUhDmTRj2pm3ykibS
