- Top 10 for LLMs - https://owasp.org/www-project-top-10-for-large-language-mode...
- Top 10 for OT - https://ot.owasp.org/
- Top 10 for Smart Contracts - https://owasp.org/www-project-smart-contract-top-10/
- Top 10 for Open Source Software - https://owasp.org/www-project-open-source-software-top-10/
So many basic screwups.
Time to stop all that pesky human use. Switch off the servers too, just to be sure.
The collection provides a structured approach to self audit the security practice regarding non-human identities. The recent CCC showcased breach of a VW connected car repository based on the exploitation of those NHI.
I only known service accounts, which pose similar threat. Both AI and Humans can use service accounts and api-keys to pose the same threats.
But it's ultimately known and wide-spread as service accounts from what I know. Is non-human identity referring to a special case or attack vector?
> Non-human identities (NHIs) are used to provide authorization to software entities such as applications, APIs, bots, and automated systems to access secured resources. Unlike human identities, NHIs are not controlled or directly owned by a human. Their identity object and authentication often work differently to human, and common human user security measures do not apply to them.
https://owasp.org/www-project-non-human-identities-top-10/20...
- such as service accounts and access keys
- such as API keys, tokens, encryption keys, and certificates
- typically achieved using static credentials or OpenID Connect (OIDC)
- sensitive NHIs such as API keys, tokens, encryption keys, and certificates
I recently refactored a moderately complicated system to remove the need for periodic distribution of updated network access credentials, and the best I could come up with were X509 client certificates, which (even if in this case it was a big improvement over the existing state of affairs) feel archaic...
Within the next 20–25 years, you may need that same safeguard in face-to-face meetings, since Replicants will be lifelike enough to fool anyone.
Voight-Kampff Test: https://youtu.be/IbBfONITYNg
"Unlike human identities, NHIs are not controlled or directly owned by a human. Their identity object and authentication often work differently to human, and common human user security measures do not apply to them."
So this is about identities who are not human as they use those service accounts. Some would go as far as to say: AIs masquerading as humans.
Adding more dimensions into reviews that aren't properly done right now will be extremely tricky.
And yes, you're absolutely right. Attempting to manage NHIs across multiple cloud/service providers without having proper automation in place is a total nightmare.
https://owasp.org/www-project-non-human-identities-top-10/20...
This comprehensive list highlights the most critical challenges in integrating Non-Human Identities (NHIs) into the development lifecycle, ranked based on exploitability, prevalence, detectability, and impact.