For every employee in your organization, there are between 25 and 50 non-human identities operating in the background — service accounts, API keys, OAuth tokens, automation credentials, certificates, and now AI agents. In some environments, ManageEngine's 2026 Identity Security Outlook found machine-to-human ratios as high as 500:1.
These non-human identities (NHIs) don't complete MFA challenges. They don't have normal working hours to baseline against. They don't quit, retire, or respond to access review emails. And 71% of them aren't rotated within recommended timeframes, according to CSO Online. They sit in your environment, often with elevated privileges, operating as permanent access keys that nobody remembers to revoke.
The results are predictable. 68% of security incidents now involve machine identities. Only 12% of organizations report being highly confident in their ability to prevent attacks via NHIs. Half of all organizations have experienced breaches due to unmanaged non-human identities. And the security industry is converging on a consensus: machine identities will become the primary breach vector in cloud environments in 2026.
We locked the front door with MFA and Zero Trust. The back door — API keys hardcoded in repos, service accounts with domain admin privileges, OAuth tokens from vendors who left two years ago — has been open the entire time.
The NHI Explosion: How Machine Identities Became the Largest Attack Surface
The growth of non-human identities isn't a gradual trend — it's an exponential curve driven by three forces that are all accelerating simultaneously.
Cloud-native architectures create identities at machine speed. Every Kubernetes pod that spins up during auto-scaling creates workload identities. Every GitHub Actions workflow generates tokens. Every Terraform run provisions service principals. A single deployment pipeline can create more machine identities in 20 minutes than your entire company has human users. Unlike human identities that HR carefully manages, NHIs multiply through automated processes with no centralized oversight.
AI agents are the newest identity explosion. These aren't chatbots answering questions — they're autonomous systems authorized to execute commands, move production data, modify configurations, and trigger downstream workflows. Microsoft Copilot has access to your SharePoint. GitHub Copilot can commit to your repos. Your marketing team's AI assistant pulls customer records from Salesforce. CyberArk predicts 2026 will see the first major breach traced back to an over-privileged AI agent. The terrifying part? It won't look like an attack — it will look like normal automation behavior.
Secrets sprawl is epidemic. Wiz research found that 65% of the top 50 AI companies had leaked verified secrets on GitHub — API keys, tokens, and credentials buried in deleted forks, gists, and developer repos. Cybernews analyzed 38,630 Android AI apps and found 72% contained at least one hardcoded secret, with an average of 5.1 secrets per app. Truffle Security scanned the November 2025 Common Crawl dataset and identified 2,863 live Google API keys vulnerable to privilege escalation — belonging to major financial institutions, security companies, and even Google itself. Researchers analyzing the same Common Crawl data found nearly 12,000 live API keys and passwords embedded in publicly accessible web pages.
The OWASP Non-Human Identities Top 10 for 2025 ranks improper offboarding as the number one risk. When a project gets cancelled, when a vendor integration gets deprecated, when a developer leaves — does anyone remember to delete the service accounts? In most organizations, the answer is almost never. The Twitch incident revealed the company had 27,000 active service accounts with no centralized inventory. The credential that was compromised had been created in 2011 and never rotated — a decade of exposure sitting in a database.
Why Traditional Security Tools Can't See the NHI Threat
The fundamental problem is that every security tool in your stack was designed for human identities. The assumptions baked into IAM, EDR, SIEM, and CASB solutions don't hold for machine identities.
IAM assumes identities belong to people. Identity and access management systems expect identities to have managers who respond to access review emails. They expect lifecycle events — onboarding, role changes, offboarding — that align with HR processes. NHIs have no manager. They never respond to certification campaigns. They have no HR record. Legacy IAM systems are structurally incapable of governing identities that don't fit the human model, which is why less than a quarter of organizations have documented policies for creating or removing AI identities.
MFA doesn't apply. When an attacker steals a human credential, MFA is the safety net. When an attacker steals an API key, there is no second factor. The key is the entire authentication — possession equals access. OAuth tokens bypass MFA by design, because they represent proof of already-completed authentication. This is why token theft accounted for 31% of Microsoft 365 breaches in 2025, surpassing traditional credential compromise.
Behavioral baselines break down. SIEM rules and UEBA solutions detect anomalies by establishing patterns of normal behavior — login times, source IPs, access patterns. An API key doesn't have "normal working hours." A service account doesn't log in from a predictable geographic location. An automation credential may legitimately access thousands of resources in minutes. When normal behavior is indistinguishable from malicious behavior, anomaly detection produces nothing but noise.
Secret sprawl defies inventory. You can't secure what you can't see. NHIs exist in code repositories, CI/CD pipelines, environment variables, configuration files, documentation wikis, Slack messages, and dozens of other locations that no single tool monitors. More than 16% of organizations don't even track the creation of new AI-related identities. When a machine credential is compromised, detection depends on knowing it existed in the first place — and most organizations don't.
How Honeytokens Catch Compromised Non-Human Identities
Cyber deception solves the NHI detection problem from a completely different angle. Instead of trying to monitor every machine identity (an impossible task when you have 50x more NHIs than humans), you plant honeytoken credentials — fake API keys, decoy service accounts, bogus OAuth tokens — in the exact locations where attackers find and exploit real NHIs. Any attempt to use a honeytoken is, by definition, unauthorized. Zero false positives. Immediate signal.
Honeytoken API Keys in Code Repositories
Attackers and automated scanners systematically harvest credentials from GitHub repos, including commit history, deleted forks, and gist files. Wiz found 65% of top AI companies leaked secrets this way. Mine2 honeytokens — fake AWS access keys, bogus database connection strings, decoy API tokens — planted in code repositories, CI/CD configs, and environment variable files create tripwires that fire the moment a harvested credential is used. The attacker doesn't know which keys are real and which are honeytoken traps. Any attempt to authenticate with a honeytoken triggers an immediate alert, revealing both the compromised repository and the attacker's infrastructure.
Decoy Service Accounts in Active Directory
Service accounts are the crown jewels of NHI abuse. They often hold domain-level privileges, never expire, and are rarely monitored. Mine2 deploys decoy service accounts in Active Directory — names like svc_azure_sync, automation_backup, legacy_api_bridge — that look like exactly the kind of high-value, forgotten machine identities attackers target. Any authentication attempt against a decoy service account is a guaranteed indicator of compromise — someone is either testing harvested credentials or performing Active Directory reconnaissance.
Honeytoken Cloud Credentials in Cloud Environments
Cloud environments are ground zero for NHI sprawl. AWS IAM roles, Azure service principals, and GCP service account keys multiply with every deployment. Mine2's Cloud Mines include honeytoken IAM credentials and fake cloud resource endpoints scattered across your cloud footprint. When a compromised cloud credential is used to enumerate resources, or when a stolen IAM key attempts to access a phantom S3 bucket, the alert fires immediately. This catches both external attackers who have harvested cloud credentials and insider threats accessing resources beyond their authorization.
MineField Decoy Services Catch NHI-Driven Lateral Movement
When an attacker compromises a service account or API key, their next step is reconnaissance — probing the network to discover what the credential can access. Mine2's MineField deploys decoy TCP services that look like real API endpoints, database servers, and internal services. When a compromised NHI is used to scan or connect to a MineField decoy, the alert fires — catching the lateral movement that SIEM rules and network monitoring would classify as normal machine-to-machine traffic.
Honeytoken Secrets in Configuration Files and Documentation
The most dangerous NHI compromises start in the most mundane locations — .env files, Docker configs, internal wikis, Confluence pages, shared drives. Developers store credentials in these locations for convenience, and attackers know exactly where to look. Mine2 honeytokens planted in these same locations — fake database passwords in .env files, bogus API keys in documentation, decoy cloud credentials in config templates — catch credential harvesting regardless of whether the attacker is an external threat actor, an insider, or an automated infostealer.
Practical Playbook: Securing Non-Human Identities with Deception
1. Audit Your NHI Estate, Then Plant Honeytokens Alongside Real Credentials
Start by mapping your service accounts, API keys, OAuth integrations, and cloud credentials. For every category of real NHI, deploy corresponding honeytokens in the same locations and formats. Attackers can't distinguish between real and fake credentials — the honeytokens function as canaries across your entire NHI landscape.
2. Seed Honeytoken API Keys in Every Code Repository
Plant fake AWS keys, database credentials, and API tokens in your Git repositories — in active code, in deleted branches, in CI/CD configuration files. These are the exact locations automated secret scanners and attackers harvest credentials from. Every honeytoken use attempt reveals a compromised repository.
3. Deploy Decoy Service Accounts with Enticing Privilege Indicators
Create AD service accounts with names that suggest high-value access: svc_prod_db, automation_admin, backup_dc. Set up monitoring so any authentication attempt triggers an immediate alert. These decoys catch both credential stuffing and targeted Active Directory reconnaissance.
4. Scatter Cloud Honeytokens Across IAM and Resource Boundaries
Deploy honeytoken IAM credentials in your cloud environments. Create fake S3 buckets, phantom Lambda functions, and decoy RDS instances that only exist as tripwires. Any resource enumeration that touches a cloud honeytoken reveals compromised cloud access.
5. Harden with Fortify, Then Layer Deception
Use Mine2's Fortify to implement NHI hygiene: enforce least privilege on service accounts, rotate credentials on schedule, disable dormant machine identities, and restrict API key scopes. Then layer honeytokens on top — so that even if an attacker finds a real credential that slipped through hardening, the next credential they test is a honeytoken trap.
6. Integrate Honeytoken Alerts with NHI Lifecycle Management
Wire honeytoken alerts into your SOAR platform with automated responses: revoke the compromised credential, disable the associated service account, audit all NHIs in the same repository or cloud project, and initiate incident response. The zero-false-positive nature of honeytokens means automated response won't disrupt legitimate machine-to-machine operations.
The Bottom Line
Non-human identities are the largest unmanaged attack surface in modern enterprise environments. They outnumber humans by 50:1, drive 68% of security incidents, and operate completely outside the IAM, MFA, and behavioral analytics frameworks we've spent a decade building for human users.
Traditional security tools can't solve this problem because they were built on assumptions that don't hold for machine identities. API keys don't complete MFA. Service accounts don't have managers. OAuth tokens don't have normal working hours. You can't baseline what has no pattern, and you can't monitor what you can't inventory.
Honeytokens take a fundamentally different approach. Instead of trying to monitor every machine identity in your environment — an impossible task at 50:1 ratios — they plant fake credentials in the exact locations where attackers find real ones. The result is a detection layer that fires with absolute certainty the moment a compromised NHI is used, regardless of whether it's an API key harvested from a GitHub repo, a service account credential pulled from AD, or an OAuth token stolen in a supply chain breach.
In a world where a single forgotten service account from 2011 can be the entry point for a billion-dollar breach, certainty of detection isn't optional. It's the only thing standing between your organization and the 68% of incidents that started with a machine identity nobody remembered existed.
Ready to detect compromised non-human identities before they're weaponized? See how Mine2's honeytokens protect your NHI estate →
mine2 team
The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.
Recent Articles
The Threat Is Already Inside: Why Honeytokens Catch Insiders That DLP, UEBA, and SIEM Can't
Your EDR Is Dead — Now What? Why Deception Is the Detection Layer That Survives EDR Killers
When Trusted Vendors Become Attack Vectors: How Honeytokens Catch Supply Chain Breaches
Need Security Help?
Protect your organization with MINE2's cyber deception platform.
