Open web application Security Project (OwASP), is an international non-profit organization to improve cyber security of web applications, one is one Top 10 list Machine in software applications compiled the biggest weaknesses in authentication. Owasp provides supporting guidelines to reduce or avoid risks. Ten guidelines describe a wide range of security risks and attack vectors, usually in dealing with the authentication of non-human identity (non-human identity; NHI) in web and cloud applications.

Attacks on certification methods and identity management are proving to be more and more for developers as a challenge in securing web -based software applications. The brilliant example here is an attack on Okta, an American provider for identity management, attacking the management of access tox in Github and the shared access signature (SAS) leakage to carry to Microsoft. All is generally an important weak of non-human identity, resulting in exploitation for many more spectacular attacks, for example on the IT system of the US government. According to the presentation of the Microsoft incident, the attackers used manipulative authentication tox in public clouds to reach information from US government officials and concerned customer accounts.
- In recent years, attacks on certification and identification management have increased significantly. For developers, safe integration of identity in web applications (not only) is a challenge.
- In particular, non-human identities for automated processes and system interactions are attractive goals for cyber criminal.
- The use of lax with NHIS (non-human identity) can cause heavy damage through identification and data leaks. Developers are well advised that they will practice useful recommendations of new Owasp Top 10 NHI.
Such safe handling of such NHI is therefore a requirement for web-based applications and permanent protection of cloud applications. In particular, Claude plays an important role in the growing need of NHI due to rising dependence on third -party APIs and the use of LLM and AI agents. However, many devices for identification and access management (Identification and Access Management, IAM) are mainly ready for human users. Companies find it difficult for NHIS to apply and implement IAM rules and procedures.
This was the reading sample of our Heise Plus article “Identification Management: More Protection for Non-Human Identification”. With a heise plus membership you can read and hear the entire article.
