TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

OWASP Non-Human Identities Top 10

157 点作者 raskelll4 个月前

14 条评论

octonaut4 个月前
TIL that OWASP has a bunch of Top 10 projects other than application security. Some others I found:<p>- Top 10 for LLMs - <a href="https:&#x2F;&#x2F;owasp.org&#x2F;www-project-top-10-for-large-language-model-applications&#x2F;" rel="nofollow">https:&#x2F;&#x2F;owasp.org&#x2F;www-project-top-10-for-large-language-mode...</a><p>- Top 10 for OT - <a href="https:&#x2F;&#x2F;ot.owasp.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;ot.owasp.org&#x2F;</a><p>- Top 10 for Smart Contracts - <a href="https:&#x2F;&#x2F;owasp.org&#x2F;www-project-smart-contract-top-10&#x2F;" rel="nofollow">https:&#x2F;&#x2F;owasp.org&#x2F;www-project-smart-contract-top-10&#x2F;</a><p>- Top 10 for Open Source Software - <a href="https:&#x2F;&#x2F;owasp.org&#x2F;www-project-open-source-software-top-10&#x2F;" rel="nofollow">https:&#x2F;&#x2F;owasp.org&#x2F;www-project-open-source-software-top-10&#x2F;</a>
评论 #42930237 未加载
chillax4 个月前
A better link would be the dedicated site for it, also contains introduction which describes what NHI are: <a href="https:&#x2F;&#x2F;owasp.org&#x2F;www-project-non-human-identities-top-10&#x2F;2025&#x2F;" rel="nofollow">https:&#x2F;&#x2F;owasp.org&#x2F;www-project-non-human-identities-top-10&#x2F;20...</a>
评论 #42929664 未加载
LoganDark4 个月前
Hah, turns out they&#x27;re talking about stuff like access tokens, not otherkin!
评论 #42931660 未加载
2d8a875f-39a2-44 个月前
I especially enjoyed NHI10:2025 Human Use of NHI.<p>Time to stop all that pesky human use. Switch off the servers too, just to be sure.
评论 #42932978 未加载
mirages4 个月前
This focuses mostly more on internal security (i.e after the attacker already has a foothold inside) versus the classic OWASP that are for external front fracing applications
评论 #42931613 未加载
xg154 个月前
They are using some fancy wording, but this just seems to be about regular service accounts (i.e. &quot;bots&quot;) when they are mixed with user accounts in a SoA setting. No AI needed.
评论 #42928977 未加载
评论 #42929334 未加载
评论 #42929605 未加载
antithesis-nl4 个月前
I would <i>love</i> to hear about any useful work around leak&#x2F;abuse-resistance improvements of service accounts and API keys (i.e. the &#x27;NHI&#x27; referenced here -- awkward terminology!). Passkeys are a great solution when some kind of end-user interactivity is feasible, and AWS Secrets Manager is supposedly very good if you&#x27;re entirely on that platform, but for self-hosting, the options seem limited (and things like Hashicorp Vault still don&#x27;t <i>fully</i> solve the problem)?<p>I recently refactored a moderately complicated system to remove the need for periodic distribution of updated network access credentials, and the best I could come up with were X509 client certificates, which (even if in this case it was a big improvement over the existing state of affairs) feel archaic...
评论 #42935564 未加载
authnopuz4 个月前
Another good source of NHI definitions, concepts, and threats <a href="https:&#x2F;&#x2F;nhimg.org&#x2F;the-ultimate-guide-to-non-human-identities" rel="nofollow">https:&#x2F;&#x2F;nhimg.org&#x2F;the-ultimate-guide-to-non-human-identities</a>
belter4 个月前
It’s already wise to establish a shared authentication word or phrase with family and colleagues, because AI can now convincingly mimic a person’s face, voice, gestures, even their gait during video calls or phone conversations. A bot won’t know the secret passcode when you ask for it.<p>Within the next 20–25 years, you may need that same safeguard in face-to-face meetings, since Replicants will be lifelike enough to fool anyone.<p>Voight-Kampff Test: <a href="https:&#x2F;&#x2F;youtu.be&#x2F;IbBfONITYNg" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;IbBfONITYNg</a>
评论 #42932154 未加载
batmansmk4 个月前
Identities are very hard to manage and secure overall. Audits are super long, tedious.<p>Adding more dimensions into reviews that aren&#x27;t properly done right now will be extremely tricky.
评论 #42931998 未加载
zingababba4 个月前
Wtf? We have been calling these workload identities for years.
CodeCompost4 个月前
Sorry but can anybody explain what Non-Human Identities are?
评论 #42930059 未加载
评论 #42931937 未加载
aetherspawn4 个月前
Based on the title and the first few paragraphs, I expected this to be about risk of datacenter security breaches by Bears, and the like.
评论 #42929188 未加载
magicalhippo4 个月前
Full title is &quot;OWASP Non-Human Identities Top 10&quot;.<p><i>This comprehensive list highlights the most critical challenges in integrating Non-Human Identities (NHIs) into the development lifecycle, ranked based on exploitability, prevalence, detectability, and impact.</i>