
New research from Rubrik Zero Labs has claimed AI agents in the workplace are creating a surge of ‘non-human identities’, which are now outnumbering human users 82-to-1.
Meta Description: Non-human identities now outnumber humans 82-to-1 as AI agents create unprecedented identity crisis. Discover enterprise strategies for securing machine identities, implementing identity resilience, and protecting against credential-based attacks in agentic AI environments with comprehensive IAM governance frameworks.
Published: November 21, 2025 | Reading Time: 20 minutes | Category: Enterprise AI Security & Identity Management
New research from Rubrik Zero Labs has claimed AI agents in the workplace are creating a surge of ‘non-human identities’, which are now outnumbering human users 82-to-1.
This staggering ratio represents one of the most dramatic shifts in enterprise identity management history, fundamentally transforming how organizations approach cybersecurity, access control, and threat mitigation. The proliferation of non-human identities—encompassing AI agents, service accounts, API tokens, automation scripts, and machine-to-machine authentication credentials—has expanded the digital attack surface at a pace that outstrips traditional security controls.
This growth comes as 90% of global leaders cite identity attacks as their top cyberersecurity concern—as non-human identities are expanding the attack surface faster than security teams can keep up with.
The critical challenge: Organizations face a fundamental identity crisis where the traditional perimeter-based security model has collapsed under the weight of cloud migration, remote work adoption, and now agentic AI deployment. Identity has emerged as the primary attack surface, with threat actors increasingly prioritizing credential theft and legitimate authentication over traditional malware-based exploits.
“Managing identities in the era of AI has become a complex endeavor, especially with the labyrinth of NHIs,” said Kavitha Mariappan, Chief Transformation Officer at Rubrik. “We have an under-the-radar crisis on our hands where a single compromised credential can grant full access to an organization’s most sensitive data. Attackers are no longer breaking in, but logging in.”
This comprehensive analysis examines the enterprise implications of explosive non-human identity growth, quantifies the security and operational risks, provides actionable mitigation strategies, and establishes frameworks for achieving identity resilience in the age of agentic AI.
Non-human identities represent digital credentials, authentication mechanisms, and access privileges assigned to automated systems, applications, services, and artificial intelligence agents rather than individual human users. These machine identities form the backbone of modern enterprise automation and AI-powered operations.
Core categories of non-human identities:
Service Accounts:
API Authentication Credentials:
Cryptographic Certificates:
AI Agents and Autonomous Systems:
Container and Infrastructure Identities:
New research from Rubrik Zero Labs, based on a survey by Wakefield Research of over 1,600 IT security decision makers, finds 89 percent of respondents have fully or partially incorporated AI agents into their identity infrastructure, and an additional 10 percent have plans to.
Factors driving exponential non-human identity growth:
1. Agentic AI Deployment
Organizations deploying autonomous AI agents for business process automation create multiple machine identities per agent:
A single customer service AI agent might require 15-20 distinct non-human identities to function across integrated systems, multiplying rapidly as organizations deploy hundreds or thousands of specialized agents.
2. Cloud-Native Architecture Adoption
Microservices architectures generate exponential identity requirements:
3. DevOps and Automation Proliferation
Modern development practices create vast identity ecosystems:
4. API Economy Expansion
Organizations integrate dozens to hundreds of third-party services:
The comprehensive survey of 1,625 global IT security decision-makers reveals the unprecedented scope of the identity crisis:
Adoption and Integration Metrics:
89 percent of respondents have fully or partially incorporated AI agents into their identity infrastructure, and an additional 10 percent have plans to.
This near-universal adoption means that by 2026, virtually every major enterprise will operate with agentic AI systems requiring extensive non-human identity management—yet most lack adequate governance frameworks for these machine credentials.
Threat Landscape Projections:
58 percent estimate that in the next year, 50 percent or more of the cyberattacks they deal with will be driven by agentic AI.
Security leaders anticipate a fundamental shift where AI-powered or AI-targeted attacks become the dominant threat vector, requiring completely reimagined defense strategies centered on identity protection rather than traditional perimeter security.
Recovery Confidence Erosion:
Only 28 percent of respondents believe they could fully recover from a cyber incident in 12 hours or less, compared to 43 percent in 2024.
This dramatic 15-point decline in recovery confidence over a single year reflects the compounding complexity introduced by proliferating non-human identities, where compromised machine credentials can provide persistent backdoor access that traditional incident response procedures struggle to remediate.
Time-to-Recovery Degradation:
58 percent of respondents believe it would take at least two days to recover and achieve full-service operations post-compromise.
Extended recovery windows translate directly to business disruption costs, with each additional hour of downtime representing lost revenue, productivity degradation, customer dissatisfaction, and potential regulatory penalties for organizations in regulated industries.
Ransomware Payment Trends:
More alarmingly, 89% of ransomware victims agreed to pay the ransom to recover from, or stop, the attack.
This extraordinarily high payment rate demonstrates both the severity of identity-driven compromises and the inadequacy of backup and recovery strategies in environments with complex non-human identity ecosystems.
Despite an evolving landscape, common attack vectors aren’t changing. Four in five (79%) CrowdStrike detections didn’t involve malware—just the attacker logging in.
The modern cyber kill chain for identity-driven attacks:
Phase 1: Initial Credential Acquisition
Social engineering remains a key vector, with 86% of basic web app attacks today relying on stolen credentials, and non-human identities can be just as susceptible to deceit.
Phase 2: Privilege Escalation
Once attackers possess initial non-human identity credentials, they leverage:
Phase 3: Lateral Movement
Social engineering (24%), legitimate credential compromise (21%), forged authentication tokens (20%) and MFA bypass (17%) are among the most popular attack techniques.
Attackers with compromised non-human identities move freely through environments:
Phase 4: Data Exfiltration and Impact
Compromised non-human identities provide ideal exfiltration pathways:
Direct Financial Consequences:
| Impact Category | Cost Range per Incident | Contributing Factors |
|---|---|---|
| Incident Response | $150,000 – $500,000 | Forensic investigation, threat hunting, credential remediation across thousands of machine identities |
| Business Disruption | $500,000 – $5,000,000+ | Revenue loss during recovery, productivity degradation, customer service interruption |
| Ransomware Payment | $100,000 – $10,000,000+ | 89% payment rate, amounts scaling with organization size and data sensitivity |
| Regulatory Penalties | $50,000 – $50,000,000+ | GDPR, CCPA, HIPAA violations from inadequate identity protection |
| Customer Remediation | $200,000 – $2,000,000+ | Credit monitoring, legal settlements, customer notification costs |
| Reputation Damage | Immeasurable long-term impact | Brand value erosion, customer trust degradation, competitive disadvantage |
Operational Consequences:
Identity Management Complexity: Organizations struggle to maintain visibility into sprawling non-human identity ecosystems:
Audit and Compliance Challenges:
The risks aren’t going unnoticed, though, with 89% of organizations planning to hire staff dedicated specifically to identity security in the next year.
This unprecedented hiring surge reflects recognition that traditional IT security roles lack specialized expertise for the unique challenges of non-human identity governance, AI agent credential management, and machine-to-machine authentication security.
Emerging identity security roles:
Non-Human Identity Architects:
Identity Resilience Engineers:
AI Agent Security Specialists:
Furthermore, 87% plan to change their IAM provider, with 58% citing security concerns as their main reason for switching.
This mass migration represents both recognition of IAM solution inadequacy and opportunity for providers offering comprehensive non-human identity management capabilities.
Factors driving IAM provider switching:
Inadequate Non-Human Identity Support:
Security Capability Gaps:
Scalability Limitations:
Compliance and Governance Deficiencies:
The foundation of non-human identity security: You cannot secure what you cannot see.
Automated Discovery and Classification:
Implement continuous scanning to identify all non-human identities across:
Cloud Infrastructure:
Application Layer:
Secrets Management Systems:
AI Agent Ecosystems:
Discovery tooling recommendations:
# Example automated non-human identity discovery script
def discover_nhi_landscape():
"""
Comprehensive NHI discovery across enterprise infrastructure
"""
nhi_inventory = {
'cloud_identities': [],
'api_credentials': [],
'service_accounts': [],
'ai_agent_identities': [],
'certificates': [],
'ssh_keys': []
}
# Cloud provider credential enumeration
nhi_inventory['cloud_identities'] = scan_aws_iam_roles() + \
scan_azure_service_principals() + \
scan_gcp_service_accounts()
# Source code repository scanning
nhi_inventory['api_credentials'] = scan_github_repos_for_secrets() + \
scan_gitlab_projects_for_credentials() + \
scan_bitbucket_for_exposed_keys()
# Application configuration analysis
nhi_inventory['service_accounts'] = scan_configuration_files() + \
scan_environment_variables() + \
scan_database_connection_strings()
# AI agent credential mapping
nhi_inventory['ai_agent_identities'] = enumerate_ai_agent_credentials() + \
map_agent_tool_access_tokens() + \
identify_agent_service_accounts()
# Certificate and key discovery
nhi_inventory['certificates'] = scan_certificate_stores() + \
enumerate_tls_certificates() + \
discover_code_signing_certs()
nhi_inventory['ssh_keys'] = scan_authorized_keys_files() + \
enumerate_deployment_keys() + \
identify_service_ssh_credentials()
return classify_and_prioritize_nhis(nhi_inventory)
```
**Classification and Risk Scoring:**
Categorize discovered non-human identities by risk level:
```
NHI Risk Score = (Privilege Level × Data Sensitivity × Credential Age × Rotation Frequency) / Security Controls
Where:
- Privilege Level: 1-5 (read-only to admin)
- Data Sensitivity: 1-5 (public to highly confidential)
- Credential Age: Days since creation
- Rotation Frequency: 1/days_between_rotations
- Security Controls: 0.5-2.0 (comprehensive to minimal)
Risk Tiers:
- Critical (>100): Immediate remediation required
- High (51-100): Remediate within 7 days
- Medium (26-50): Remediate within 30 days
- Low (≤25): Standard lifecycle management
Automated Provisioning:
Eliminate manual credential creation prone to errors and shadow IT:
# Example Infrastructure-as-Code NHI provisioning
apiVersion: iam.security.io/v1
kind: NonHumanIdentity
metadata:
name: customer-service-ai-agent
labels:
environment: production
owner: ai-ops-team
purpose: customer-support-automation
spec:
identityType: AI_AGENT
authentication:
method: OIDC
provider: enterprise-identity-provider
tokenLifetime: 3600 # 1 hour
authorization:
permissions:
- resource: crm-database
actions: [read]
conditions:
- timeWindow: business-hours
- ipRange: internal-network
- resource: email-service
actions: [send]
constraints:
- rateLimit: 100/hour
- recipientDomains: [customer-domains]
lifecycle:
maxAge: 90days
rotationPolicy: automatic
ownershipAttestation: quarterly
monitoring:
anomalyDetection: enabled
alertThresholds:
unusualGeography: true
privilegeEscalation: true
offHoursAccess: true
Mandatory Rotation Policies:
Establish aggressive credential rotation schedules:
| Identity Type | Rotation Frequency | Automated vs Manual |
|---|---|---|
| Production Service Accounts | 30 days | Automated |
| AI Agent Credentials | 14 days | Automated |
| API Keys (External) | 90 days | Automated |
| API Keys (Internal) | 30 days | Automated |
| TLS Certificates | Before expiration – 30 days | Automated |
| SSH Keys | 90 days | Automated |
| Database Passwords | 30 days | Automated |
| OAuth Tokens | Per provider policy | Automated |
Deprovisioning and Cleanup:
Implement automated orphaned credential detection:
def identify_orphaned_credentials():
"""
Detect and remediate orphaned non-human identities
"""
orphaned_credentials = []
# Identify credentials without active usage
for credential in all_nhis:
last_auth = get_last_authentication_timestamp(credential)
days_inactive = (datetime.now() - last_auth).days
if days_inactive > INACTIVE_THRESHOLD:
owner = get_credential_owner(credential)
if not owner or not validate_owner_employment_status(owner):
orphaned_credentials.append({
'credential': credential,
'last_used': last_auth,
'days_inactive': days_inactive,
'owner_status': 'unknown' if not owner else 'terminated',
'risk_score': calculate_orphan_risk(credential)
})
# Prioritize by risk for remediation
prioritized = sorted(orphaned_credentials,
key=lambda x: x['risk_score'],
reverse=True)
# Automated remediation workflow
for orphan in prioritized:
if orphan['risk_score'] > CRITICAL_THRESHOLD:
# Immediate revocation for critical risk
revoke_credential_immediately(orphan['credential'])
notify_security_team(orphan)
elif orphan['days_inactive'] > AUTO_REVOKE_DAYS:
# Automated cleanup after extended inactivity
schedule_credential_revocation(orphan['credential'], days=7)
notify_potential_owners(orphan)
else:
# Flag for manual review
create_remediation_ticket(orphan)
return prioritized
```
### Priority 3: Enforcing Least-Privilege Access
**Principle of Minimal Necessary Privileges:**
Right-size permissions for every non-human identity:
**AI Agent Privilege Model:**
```
Agent Base Permissions: Read-only access to designated data sources
+ Task-Specific Grants: Temporary elevated privileges for defined operations
+ Time-Bounded: Privileges automatically expire after task completion
+ Approval-Gated: High-privilege operations require human authorization
Example least-privilege AI agent configuration:
{
"agentId": "sales-forecasting-agent",
"basePermissions": {
"salesDatabase": {
"tables": ["orders", "customers", "products"],
"operations": ["SELECT"],
"rowLevelSecurity": "sales_region = agent.assigned_region"
}
},
"taskSpecificGrants": [
{
"task": "generate_annual_forecast",
"additionalPermissions": {
"financialDatabase": {
"tables": ["revenue_history"],
"operations": ["SELECT"],
"columns": ["date", "total_revenue", "region"]
}
},
"requiresApproval": true,
"approvers": ["sales-director", "finance-manager"],
"maxDuration": "2 hours",
"autoRevoke": true
}
],
"prohibitedActions": [
"DROP", "DELETE", "TRUNCATE", "ALTER",
"external_api_calls", "file_system_access"
]
}
Permission Attestation:
Require quarterly reviews of non-human identity privileges:
Non-Human Identity Anomaly Detection:
Traditional user behavior analytics (UBA) tuned for human patterns miss machine identity abuse. Implement NHI-specific behavioral baselines:
Authentication Pattern Analysis:
def detect_nhi_authentication_anomalies(credential_id):
"""
Identify suspicious authentication patterns for non-human identities
"""
# Establish baseline behavior
baseline = {
'typical_auth_times': get_historical_auth_times(credential_id),
'typical_source_ips': get_historical_source_ips(credential_id),
'typical_auth_frequency': calculate_avg_daily_auths(credential_id),
'typical_resources_accessed': get_common_resources(credential_id),
'typical_data_volume': calculate_avg_data_transfer(credential_id)
}
# Analyze recent activity
recent_activity = get_recent_authentications(credential_id, hours=24)
anomalies = []
for auth_event in recent_activity:
# Geographic anomaly
if auth_event['source_ip'] not in baseline['typical_source_ips']:
if get_ip_geolocation(auth_event['source_ip']) != get_expected_region(credential_id):
anomalies.append({
'type': 'geographic_anomaly',
'severity': 'high',
'details': f"Authentication from unexpected location: {auth_event['source_ip']}"
})
# Temporal anomaly
auth_time = auth_event['timestamp'].time()
if not is_within_expected_hours(auth_time, baseline['typical_auth_times']):
anomalies.append({
'type': 'temporal_anomaly',
'severity': 'medium',
'details': f"Authentication at unusual time: {auth_time}"
})
# Frequency spike
current_frequency = len(recent_activity)
if current_frequency > (baseline['typical_auth_frequency'] * 3):
anomalies.append({
'type': 'frequency_spike',
'severity': 'high',
'details': f"Authentication frequency {current_frequency}x baseline"
})
# Resource access anomaly
accessed_resources = auth_event['resources']
unusual_resources = set(accessed_resources) - set(baseline['typical_resources_accessed'])
if unusual_resources:
anomalies.append({
'type': 'unauthorized_resource_access',
'severity': 'critical',
'details': f"Access to unexpected resources: {unusual_resources}"
})
# Data exfiltration detection
if auth_event['data_transferred'] > (baseline['typical_data_volume'] * 5):
anomalies.append({
'type': 'data_exfiltration_indicator',
'severity': 'critical',
'details': f"Data transfer {auth_event['data_transferred']} exceeds baseline by 5x"
})
if anomalies:
trigger_security_alert(credential_id, anomalies)
if any(a['severity'] == 'critical' for a in anomalies):
initiate_automated_response(credential_id, action='suspend')
return anomalies
AI Agent Behavior Monitoring:
Specialized monitoring for autonomous agent activities:
Beyond Prevention: Planning for Identity Compromise
“Comprehensive Identity Resilience is absolutely critical to cyber recovery in this new landscape,” said Kavitha Mariappan, Chief Transformation Officer at Rubrik.
Identity resilience components:
1. Immutable Identity Audit Trails
Implement write-once, tamper-proof logging:
2. Identity Infrastructure Backups
Protect identity configurations from ransomware:
3. Rapid Credential Rotation Mechanisms
Build capability for emergency mass rotation:
def emergency_credential_rotation(scope='all'):
"""
Rapid credential rotation in response to suspected compromise
"""
if scope == 'all':
credentials_to_rotate = get_all_production_credentials()
else:
credentials_to_rotate = identify_at_risk_credentials(scope)
rotation_plan = []
for credential in credentials_to_rotate:
# Determine rotation strategy based on credential type
if credential['type'] == 'service_account':
rotation_plan.append({
'credential': credential,
'method': 'automated_password_reset',
'downtime_required': False,
'estimated_duration': '5 minutes'
})
elif credential['type'] == 'api_key':
rotation_plan.append({
'credential': credential,
'method': 'generate_new_key_update_consumers',
'downtime_required': True,
'estimated_duration': '15 minutes'
})
elif credential['type'] == 'certificate':
rotation_plan.append({
'credential': credential,
'method': 'issue_new_cert_update_trust_stores',
'downtime_required': True,
'estimated_duration': '30 minutes'
})
# Prioritize by risk and execute rotation
prioritized_plan = prioritize_rotation_plan(rotation_plan)
for item in prioritized_plan:
execute_rotation(item)
verify_rotation_success(item)
notify_stakeholders(item)
# Validate no compromised credentials remain active
audit_active_credentials()
return rotation_summary(rotation_plan)
4. Incident Response Playbooks
Develop identity-specific incident response procedures:
Phase 1: Detection and Scoping (0-2 hours)
Phase 2: Containment (2-6 hours)
Phase 3: Eradication (6-24 hours)
Phase 4: Recovery (24-72 hours)
Phase 5: Post-Incident (72+ hours)
Despite an evolving landscape, common attack vectors aren’t changing… So despite the surge in non-human identities, security teams aren’t actually faced with new challenges, just more systems to lock down.
The encouraging reality: While non-human identities dramatically expand the attack surface, threat actors still rely on the same fundamental techniques that security teams already defend against:
Credential-Based Attacks Remain Dominant:
This consistency enables practical mitigation:
Organizations don’t need entirely new security stacks—they need to extend existing controls to cover non-human identities with the same rigor applied to human accounts:
Existing Control Extensions:
| Human Identity Control | Non-Human Identity Adaptation |
|---|---|
| Password complexity requirements | API key entropy and length standards |
| Periodic password changes | Automated credential rotation |
| Multi-factor authentication | Certificate-based authentication, hardware security modules |
| Privileged access management | Service account privilege governance |
| User behavior analytics | Machine identity anomaly detection |
| Access reviews and attestation | Non-human identity permission recertification |
| Joiners/movers/leavers lifecycle | Automated provisioning/deprovisioning workflows |
The fundamental security principles remain unchanged: ✓ Principle of least privilege ✓ Defense in depth ✓ Continuous monitoring and detection ✓ Regular access reviews ✓ Incident response preparedness ✓ Security awareness and training (extended to developers creating machine identities)
1. Elevate Non-Human Identity Governance
Recognize machine credential management as board-level cybersecurity priority:
2. Invest in Specialized Talent
89% of organizations planning to hire staff dedicated specifically to identity security in the next year.
Build teams with expertise spanning:
3. Evaluate IAM Platform Capabilities
87% plan to change their IAM provider, with 58% citing security concerns as their main reason for switching.
Assess current IAM solutions against non-human identity requirements:
1. Security-First AI Agent Development
Integrate identity security into AI development lifecycle:
2. Collaborate with Security Teams
Break down silos between AI development and security:
1. Eliminate Hardcoded Credentials
Systematically remove embedded secrets from code and configuration:
2. Implement Infrastructure-as-Code for Identity
Treat identity configuration as code:
As agentic AI adoption accelerates and organizations deploy increasingly sophisticated autonomous agents, the non-human identity explosion will continue unabated. Forward-looking organizations should prepare for:
5-Year Projections:
AI-Powered Identity Security: Machine learning models specifically trained to:
Zero Trust for Non-Human Identities: Extending zero trust principles to machine credentials:
Blockchain and Distributed Identity: Emerging approaches leveraging distributed ledger technology:
The non-human identity crisis represents the defining cybersecurity challenge of the AI era. Organizations that successfully navigate this transition—implementing comprehensive visibility, rigorous lifecycle management, behavioral monitoring, and identity resilience—will emerge with significant competitive advantages:
Business Benefits of Identity Excellence:
Critical imperatives for enterprise leaders:
✓ Acknowledge the crisis: Recognize that 82-to-1 identity ratios fundamentally transform security
✓ Invest strategically: Allocate budget, personnel, and executive attention to non-human identity governance
✓ Extend existing controls: Apply proven human identity security practices to machine credentials
✓ Build resilience: Plan for credential compromise, not just prevention
✓ Collaborate cross-functionally: Unite security, AI, and development teams around shared identity security objectives
✓ Evaluate IAM platforms: Ensure identity infrastructure scales to manage explosive NHI growth
✓ Monitor continuously: Implement behavioral analytics detecting machine identity abuse
✓ Automate relentlessly: Manual credential management fails at scale; automation is imperative
“Attackers are no longer breaking in, but logging in, and comprehensive Identity Resilience is absolutely critical to cyber recovery in this new landscape.”
The future belongs to organizations that master identity security at scale, protecting the proliferating machine credentials powering AI-driven business transformation while maintaining the agility to innovate rapidly in competitive markets. The non-human identity challenge is daunting—but with strategic focus, appropriate investment, and comprehensive governance, achievable.
Industry Research and Reports:
Regulatory Guidance:
Technical Standards:
Security Frameworks:
Recent Posts