Guidelines that govern the rights and permissions granted to Non-Human Identities in digital environments.
Description
Authorization principles refer to the foundational guidelines that determine how Non-Human Identities (NHIs) are granted access to resources and permissions within systems. NHIs, such as automated agents, IoT devices, or service accounts, require a clear framework for authorization to ensure security and compliance. These principles help delineate what NHIs can and cannot do, based on their roles, the context of their operations, and the sensitivity of the data they interact with. Key considerations include the principle of least privilege, where NHIs are granted only the minimal access necessary for their function, and the need for regular audits to maintain security integrity. Additionally, context-aware authorization ensures that NHIs are granted permissions based on their operational context, which can change dynamically. Establishing robust authorization principles for NHIs is crucial for protecting systems from unauthorized access and ensuring that automated processes operate within defined security boundaries.
Examples
- An IoT thermostat that can adjust temperature settings but not access security camera feeds.
- A cloud service account that can read data from a database but cannot modify it.
Additional Information
- Authorization principles can vary based on industry regulations and compliance requirements.
- Implementing role-based access control (RBAC) is a common strategy for managing NHI permissions.
References
- What are Non-Human Identities (NHIs), and how do we secure them?
- A Human's Guide to Non-Human Identities (NHIs) - Aembit
- Non-Human Identity Management: A Guide - Cycode
- NHI Characteristics. Non-Human Identities (NHIs)… | Sep, 2024
- What is a Non-Human Identity? | Silverfort Glossary
- The Complete Guide to the Growing Impact of Non-Human Identities ...
- What is a Non-Human Identity? - CyberArk
- Securing non-human identities: Why fragmented strategies fail
- What is non-human identity management - Veza
- What Are Non-Human Identities and Why Do We Need Them?