Non-human identities are everywhere in modern systems. Service accounts, automation scripts, CI/CD bots, IoT devices, API clients. They run deployments, move data, generate logs, trigger alerts. They are not people, but they hold keys that can open critical infrastructure. In SOC 2 audits, they are often invisible until something