Iso 27001 was built to guard every identity with access to sensitive systems. Non-human identities—service accounts, API keys, container roles, automation bots—are exploding in number. They move faster than humans, run at scale, and often hold more privileges. Yet they’re also the least monitored and rarely fit neatly into traditional access control models.
Under Iso 27001, ignoring non-human identities is a compliance risk. Clause 9.2 demands clear controls for all users, which includes these machine-driven accounts. Without proper authentication, role management, and auditing, one leaked token can bypass every policy. Maintaining compliance means applying the same rigor to non-human identities that you apply to employees and contractors.
Start with an inventory. Know every non-human identity in your system, its privileges, and where it is used. Map these against your access control policy. Enforce least privilege and time-bound credentials. Rotate and revoke keys automatically. Every change to a non-human identity must be logged, reviewed, and tied to a responsible owner.