It wasn’t a hacker. It wasn’t an insider. It wasn’t even a person. It was a non-human identity — a service account with more privileges than it should have, quietly holding access to systems containing HIPAA-protected health data. No face. No fingerprint. Just credentials. And once you realize how many of these exist across systems, you understand the risk.
HIPAA non-human identities are exploding in number. Every cloud app, automation script, microservice, and API integration creates them. They store credentials in environment variables, secrets managers, config files, or embedded directly into code. They run headless. They never log out. They don’t expire unless you make them. And under HIPAA, if they touch Protected Health Information (PHI), they must meet the same strict security requirements as any human user — but most of the time, they don’t.
The compliance gap is wide. Many organizations spend enormous effort encrypting data, training staff, logging access, and managing multi-factor authentication — but they skip enforcing equivalent controls for non-human identities. These identities often bypass MFA entirely, fly under the radar of access reviews, and remain active long after they’re needed. That makes them ideal targets.
You can’t protect PHI without managing non-human identities. For HIPAA compliance, these accounts need identity lifecycle management, credential rotation, scoped permissions, and continuous monitoring. It’s not optional. Every uncontrolled service account connected to PHI is a compliance and audit liability.