Non-Human Identity Security Policy

Note: This is the introduction to a 3-part series on non-human identity and implications for security policy. Links directly to each part of the series are at the bottom of this page.
Introduction
When you ask cybersecurity professionals about fundamental principles, most immediately go to the CIA triad of confidentiality, integrity, and availability. But identity is arguably even more foundational. Unique identification underpins every aspect of cybersecurity. We depend on understanding who did what: actors and actions.
Cybersecurity frameworks and policies to date have focused identity-related language on the human. We can talk at length about what people are allowed and forbidden to do. However, we have largely treated machines and their management as though they were simple property. In order to find machines responsible for their actions, you primarily had to look to sci-fi.
Yet, the modern business world is increasingly made up of machines, both physical and virtual, taking actions on our behalf. And it’s gotten complicated. The days of easily saying, “Alice pushed button X, which caused machine 123 to do function Y” are long gone - lost in layers of virtual robot middlemen. Our environments are rich and thick with cross-functional processes, automated services talking to services, and agents of all kinds.

If we are to manage the surreal world of modern business effectively, we must be able to trace the actions of our digital proxies. It’s time we took a sci-fi step further as we project human concepts into digital space. It’s time to give our proxies identity.
In the following series of articles, we discuss the “why” and “how” of managing the security of identities for things other than people. Specifically, we will discuss “non-human identity” (NHI) and how frameworks and policy must treat it differently than human identity; the linkage between identity and secrets - specifically, in the context of NHI; and ultimately, what NHI implies for security governance and policies.
Part 1: Non-Human v Human Identity

Related posts

NHI Security, Part 3: Policy Implications

NHI Security, Part 2: Identity and Secrets
