COMMENTARY: Generative AI (GenAI) has rapidly become a game-changer, transforming industries – particularly in technology and cybersecurity – as companies rush to unlock its potential. Gartner predicts that by 2027, more than 50% of the GenAI models that enterprises use will be specific to either an industry or business function – up from a mere 1% in 2023.Retrieval-augmented generation (RAG) architecture, which combines the power of large language models (LLMs) with domain-specific data to power chat or Q&A-based applications, has become the go-to foundation for enterprise GenAI implementations. With a RAG framework, companies can build applications that are highly customized to their workflows.[SC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Read more Perspectives here.]Despite the benefits, this comes with a host of challenges when it comes to data privacy, integrity, and security. That’s where organizations need to focus on proper non-human identity (NHI) management and governance. Today, NHIs outnumber human identities on average by a factor of 20x in enterprise environments, according to recent ESG research. NHIs are a digital construct that describe the credentialed access leveraged for machine-to-machine communication. These identities include service accounts, tokens, access keys, and API keys. They are the most rapidly-expanding type of identity and the least governed attack surface for organizations.While human identities are typically managed through well-established governance processes and mature governance and privileged access management (PAM) systems, NHIs often fly under the radar. Created by developers and DevOps teams directly within cloud platforms, SaaS applications, Kubernetes clusters, and CI/CD pipelines, NHIs frequently bypass standard IT workflows and security checks. Unmanaged NHIs can create hidden vulnerabilities that attackers can easily exploit. ESG research indicates that more than 46% of organizations have been subject to an NHI breach in the last 12 months.The rapid and widespread creation of NHIs, combined with the lack of centralized tracking systems, leads to significant governance issues. This can result in severe security risks like data leaks and unauthorized access. Traditional security tools, such as PAM systems designed for human users, cannot track NHIs throughout their lifecycle or understand their relationships with applications, data, and other resources. Without this contextual understanding, PAM tools cannot effectively manage or secure the growing number of NHIs.Maintain a thorough inventory of all NHIs across multi-cloud and on-premises environments to enhance visibility and management. Apply the principle of least privilege to limit NHI access, reducing potential vulnerabilities. Continuously monitor for suspicious activities involving NHIs to quickly detect and respond to unusual behaviors. Prioritize secret rotation to minimize the risk of credential compromise and other critical issues. Implement automated governance policies to establish clear guidelines for NHI management and security compliance. Decommission stale and orphaned service accounts. The rise of GenAI and the adoption of RAG architectures have revolutionized the way businesses operate, offering unprecedented customization and efficiency. However, this advancement also points to the critical need for robust management and governance of NHIs. As NHIs proliferate, often outnumbering human identities, they present significant security challenges, including increased risks of unauthorized access and data breaches. Teams must implement stringent governance practices to protect the integrity of AI systems and secure sensitive data. By doing so, organizations can enjoy the full potential of AI, while maintaining trust and security.Danny Brickman, co-founder and CEO, Oasis SecuritySC Media Perspectives columns are written by a trusted community of SC Media cybersecurity subject matter experts. Each contribution has a goal of bringing a unique voice to important cybersecurity topics. Content strives to be of the highest quality, objective and non-commercial.
AI/ML, AI benefits/risks
Six ways to secure NHIs as AI use expands

(Adobe Stock).
An In-Depth Guide to AI
Get essential knowledge and practical strategies to use AI to better your security program.
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds