Non-human identities — service accounts, machine users, CI/CD tokens, API keys — now outnumber human logins in most systems. They run code, sign releases, and pull secrets every second. But under most compliance frameworks, they are identities. They require the same security, traceability, and auditability as people. Many teams ignore this until the first policy gap is exposed.
What Are Non-Human Identities?
A non-human identity is any credential representing a machine, script, function, or microservice. Unlike typical users, these identities don’t rotate on their own. They don’t have HR records. They don’t fill out onboarding forms. But they can hold permissions that can destroy production. Because of that, regulators require them to be tracked, managed, and regularly reviewed.
Why Compliance Applies
Global standards like SOC 2, ISO 27001, PCI DSS, NIST CSF, and GDPR treat non-human identities as first-class citizens in access control. Key requirements include:
- Unique identifiers for every service account
- Least-privilege permissions by default
- Regular credential rotation and expiration dates
- Tamper-proof logging of activities
- Ownership assignment to an accountable human
- Documentation of provisioning and deprovisioning processes
Failure in any of these areas creates audit findings. Findings create delays, extra cost, and risk during renewals or funding events.