Podcast - Non-Human Identities - The Silent Risk In Cloud Security

NHI Mgmt Group

Lalit Choda, founder of the Non-Human Identity Management Group, joins Nauman Mustafa for an episode of Access Granted by Britive, where they explore how and why Non-Human Identities have become a significant security risk and what organizations can do to address them.

Key discussion topics include:

  • What’s considered an NHI? Examples include API keys, service accounts, automations, and more.

  • How static credentials, secrets sprawl, and stale accounts create vulnerabilities and increase the attack surface. -

  • Practical steps for organizations, including scanning repos for hard-coded credentials, cycling tokens, and creating a full NHI inventory.

  • The importance of Zero Standing Privileges (ZSP) and just-in-time (JIT) access to securing NHIs without impeding developer agility.

  • The intersection of AI, NHIs, and security – and balancing innovation with robust protection

🎧 Listen to Access Granted on Spotify: https://open.spotify.com/show/7ukJOqUhDmTRj2pm3ykibS