IR-015identityv1.0.0
Non-Human Identity (NHI) Compromise — Service Accounts, API Keys, and CI/CD Tokens
⚠️ high⚠️ critical
⏱ Est. Time55m
📋 Steps10 steps
🔧 Tools7 required
🔗 Integrations5 platforms
📊 Avg Resolution85m
🔧 Tools Required
siemsecrets manageridentity providercloud consolecicd platformgit secret scannerthreat intelligence platform
⚡ Triggers
service_account_off_hours_activityapi_key_geographic_anomalycicd_token_unauthorized_useservice_account_permission_escalationsecrets_manager_unusual_accesssiem_nhi_behavior_anomalygit_secret_exposure_alertgithub_actions_token_abuse
🔌 Integrations
opt
hashicorp vault
Dynamic secrets, lease revocation, and audit log for NHI credential management
opt
aws iam
Service account audit, access key management, and IAM roles for workloads
opt
github advanced security
Secret scanning and push protection for detecting leaked NHI credentials in repos
opt
splunk
NHI behavior analytics — baseline service account activity and detect anomalies
opt
cyberark conjur
Secrets management and rotation for CI/CD and application credentials
Click each step to expand the full procedure, automation hints, and expected outputs.