A security framework that requires multiple methods of verification for Non-Human Identities (NHIs) to access resources or systems.
Description
Multi-tiered authentication is a security approach designed to enhance the protection of systems and data by requiring more than one form of verification for Non-Human Identities (NHIs), such as applications, services, or devices that interact with digital resources. This method acknowledges that NHIs, which often operate autonomously, can be vulnerable to unauthorized access and attacks. By implementing multiple layers of authentication, organizations can ensure that only legitimate NHIs gain access to sensitive information or perform critical operations. For example, an NHI may first authenticate using an API key and then require a time-sensitive token generated by a secure mechanism. This layered strategy reduces the risk of compromise, as obtaining just one credential is insufficient for access. Moreover, it fosters a more robust security posture, enabling organizations to meet compliance requirements and mitigate potential threats from malicious actors targeting automated systems.
Examples
- An application authenticating through both an API key and an OAuth token.
- A cloud service requiring both a digital certificate and a one-time password for access.
Additional Information
- Helps to mitigate risks associated with automated attacks on NHIs.
- Can be integrated with existing identity management systems for seamless operation.
References
- NIST Special Publication (SP) 800-63B, Digital Identity Guidelines: Authentication and Lifecycle Management
- Human vs. Non-Human Identity in SaaS
- NIST Special Publication 800-63-3
- NIST Special Publication 800-63A
- NIST Special Publication (SP) 800-63A, Digital Identity Guidelines: Enrollment and Identity Proofing
- Digital Identity Guidelines: Authentication and Lifecycle Management
- NIST Special Publication (SP) 800-63C, Digital Identity Guidelines: Federation and Assertions
- Guidelines for Derived Personal Identity Verification (PIV) Credentials
- 2025 State of NHI and Secrets in Cybersecurity | Entro Labs
- Authentication and Authorization (v2)