<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

Still paying for legacy PAM? 🤔 Switch now, pay nothing during migration.

Search
Close icon
Search bar icon

Non-Human Identities & Secrets Sprawl: Why Vaults Aren’t Enough

See StrongDM in action →
Non-Human Identities & Secrets Sprawl: Why Vaults Aren’t Enough

Contents

Secure Access Made Simple

Built for Security. Loved by Devs.

  • Free Trial — No Credit Card Needed
  • Full Access to All Features
  • Trusted by the Fortune 100, early startups, and everyone in between

Modern infrastructure runs on non-human identities (NHIs). CI/CD jobs, automation bots, AI agents, service accounts, microservices, ephemeral workloads. And they’re not just growing in number. They’ve overtaken systems in your infrastructure.

The current NHI-to-human ratio sits at 45:1 and is accelerating. This shift brings velocity and scale, but it also introduces a massive new attack surface: secrets sprawl.

Tokens, API keys, certificates, and other ephemeral credentials are embedded in pipelines, hardcoded in configs, and passed between systems without meaningful oversight. The systems that issue and store secrets are not the same ones that enforce access control. And that’s the root of the problem

NHIs Are Now the Primary Source of Leaked Secrets

GitGuardian’s 2025 State of Secrets Sprawl report found that 23.77 million new secrets were leaked on GitHub last year—most of them tied to NHIs. More alarming? Over 5% of those repositories were already using a secrets manager. Even when secrets are “managed,” they still leak.

These credentials are:

  • Embedded in CI/CD pipelines
  • Passed through environment variables
  • Shared over Slack or Jira
  • Copy-pasted into YAML, Terraform, or Helm charts
  • Auto-suggested into code by AI pair programming tools like Copilot

Private repositories are actually 8x more likely to contain leaked secrets than public ones, largely because developers let their guard down and cut corners in “safe” internal spaces.

And most of those leaked secrets offer powerful access:

  • 96% of GitHub tokens had write access
  • 95% could access the entire repository
  • GitLab tokens commonly had full or read-only access to production systems

Secrets aren’t just secrets anymore. They’re lateral movement vectors.

Secret Stores Solve Part of the Problem

Rethinking Non-Human Identity (NHI) Management

There’s no question: vaults and secrets managers are critical infrastructure. They’ve been the backbone of how enterprises safeguard credentials for years. Tools like CyberArk’s Enterprise Vault were designed for human-centric workflows, helping users check out privileged credentials to log into servers and databases. Meanwhile, tools like HashiCorp Vault, CyberArk Conjur, GCP Secrets Manager, AWS Secrets Manager, and Azure Key Vault extend those protections to non-human identities, centralizing sensitive secrets, rotating credentials, and reducing reliance on hardcoded values in code or config files.

But these tools are limited by their pull-based architecture. By definition, they wait for an app, script, or user to ask for a secret, and then they hand it over. That approach solves part of the problem, but not the whole picture. They can’t:

  • Govern who can request secrets based on dynamic, real-time context
  • Control how credentials are used after retrieval
  • Intercept and monitor access live
  • Enforce just-in-time (JIT) or time-based approvals
  • Deliver end-to-end audit trails of post-access activity
    And perhaps most importantly, they don’t eliminate credential visibility—the secret is still exposed to the machine or person consuming it. That visibility is where the risk lives.

The Perimeter Problem

To really understand the limits of these systems, you need to think about “identity perimeters.” Each cloud provider (AWS, Azure, GCP) has excellent native capabilities for NHIs that are often passwordless. Inside that perimeter, identities can be federated and managed securely. But the moment you move outside that perimeter or cross the cloud’s shared responsibility boundary, things change.

Take AWS as an example: your IAM Role may allow you to spin up an EC2 instance, but that doesn’t automatically grant you access to the operating system on that machine. The OS layer sits outside AWS’s identity perimeter, so traditionally, credentials have to be brokered. That’s why secret stores exist in the first place: they bridge the gaps between perimeters.

The Next Step

Federation and secret stores are necessary, but they aren’t sufficient. What’s missing is a layer that not only brokers credentials but also governs how, when, and if they’re used—with Zero Trust principles applied end-to-end. That means moving beyond “here’s your secret, good luck” to continuous control, contextual policy enforcement, and the elimination of credential visibility altogether.

StrongDM Doesn’t Store Secrets—It Governs Access

StrongDM takes a different approach. It’s important to recognize that the platform doesn’t replace vaults. Rather, it sits between identities and the infrastructure they’re trying to access. It’s a real-time access broker built on Zero Trust principles, designed to remove credentials from the equation entirely.

Here’s a breakdown of how it works:

Dynamic Credential Injection

When a user, or NHI, requests access to a database, server, Kubernetes cluster, or cloud service:

  1. StrongDM authenticates the identity (human or machine)
  2. It evaluates a policy based on role, session metadata, time-of-day, device posture, etc.
  3. If access is permitted, it injects the credentials into the live session behind the scenes
  4. The requesting entity never sees the credentials
  5. The session is fully logged and auditable

Pluggable Secrets Sources

StrongDM integrates natively with your existing secrets managers:

  • HashiCorp Vault
  • CyberArk Conjur
  • AWS Secrets Manager
  • Azure Key Vault
  • GCP Secret Manager

StrongDM does not require credential duplication or new storage locations. The system fetches credentials on demand using short-lived, ephemeral tokens with zero credential persistence on disk.

If a secret is rotated in your secrets manager, StrongDM picks it up immediately—no restart, no user involvement, no downtime.

Policy-Based Access Control (PBAC)

Access is governed by declarative policies, which can be configured using:

  • User identity and group membership
  • Resource metadata (e.g., “prod,” “PCI,” “read-only”)
  • Time windows (e.g., business hours only)
  • Session duration caps
  • Approval workflows (manual or automated)
  • Dynamic session attributes (IP range, device type, etc.)

This means an NHI can be granted temporary, just-in-time access to a specific PostgreSQL instance in a sandbox environment only during a deployment window, only via CI, only if an approver signs off, and all without ever exposing a credential.

Auditing, Observability, and Compliance

Every session brokered by StrongDM is:

  • Logged in real time with full session metadata
  • Replayable for interactive systems like SSH or RDP
  • Searchable via API, CLI, or the web UI
  • Exportable to SIEMs and compliance systems

This creates a complete audit trail of:

  • Who accessed what
  • When and for how long
  • What they did during the session
  • Which credentials were used, and how they were injected

This level of observability is critical for satisfying compliance frameworks like PCI-DSS, HIPAA, SOC 2, and NIST 800-53.

The Future of Secrets Is No Secrets 

Secrets management will always have a place in infrastructure. But visibility to secrets? That’s optional.

When credentials are never exposed—never on disk, never in memory, never on screen—then they can’t be:

  • Leaked in logs or crashes
  • Stolen via memory scraping
  • Reused across services
  • Passed around Slack or pasted into Jira

This is beyond vaults. Beyond rotation. Beyond cleanup scripts. This is eliminating the root cause of secrets sprawl: human and machine access to the secret itself.

Access Governance Is the Missing Layer

Secrets managers help store secrets. But modern infrastructure needs a way to govern access to them—especially in an NHI-dominated world.

StrongDM doesn’t replace your vault. It makes your vault invisible. It transforms access from a risky point-to-point credential exchange into a policy-driven, ephemeral connection—governed, observed, and logged.

In a machine-speed, AI-enabled environment where credentials leak at the speed of automation, that level of control is not just useful—it’s essential.

Take control of non-human identities before secrets sprawl takes over. StrongDM eliminates credential exposure and governs access in real time. See how it works for your environment, book a demo today.

Nicolas Corrarello

About the Author

, Principal Solutions Engineer, has spent his career at the intersection of security, identity, and infrastructure, helping fast-growing startups like HashiCorp and Wiz build and scale world-class technical teams. Today, he advises organizations on strategic approaches to security and identity, while still keeping his hands in the nuts-and-bolts of technology.

💙 this post?
Then get all that StrongDM goodness, right in your inbox.

You May Also Like

What Is Access Certification? Process, Benefits & Best Practices
What Is Access Certification? Process, Benefits & Best Practices
Access certification is more than a checkbox; it’s how you prove and enforce least privilege at scale. It ensures every user, system, and role has only the access they need, nothing more. In this guide, you’ll learn how to run access certifications that satisfy auditors, reduce insider threats, and clean up outdated privileges. You’ll explore common types (manual vs. automated, user-based vs. resource-based), challenges, and how modern teams streamline the process with real-time visibility and automation.
What Is Authorization? Types, Examples, and How It Works
What Is Authorization? Types, Examples, and How It Works
Authorization isn’t just about who gets in, it’s about what they can do once they’re inside. And that’s where most breaches happen. Whether you're enforcing RBAC, ABAC, or context-based policies, effective authorization ensures users only access what they need, no more, no less. This post unpacks how authorization works, compares key models, and explores best practices for enforcing least privilege at scale.
From Legacy PAM to Identity Firewall: The Shift is Here
From Legacy PAM to Identity Firewall: The Shift is Here
More than just an incremental improvement, the Identity Firewall is an architectural transformation that enables both security and velocity in modern environments. Organizations ready to lead this transformation will build competitive advantages that extend far beyond security compliance.
Hackers Don’t Hack In. They Log In.
Hackers Don’t Hack In. They Log In.
Most breaches don’t begin with hacking—they start with logging in. Discover how compromised credentials fuel modern cyberattacks and why Zero Trust Privileged Access is essential for securing today’s identity-driven environments.
A New Era of Vault-Agnostic Secrets Management Is Here
A New Era of Vault-Agnostic Secrets Management Is Here
Discover why traditional secrets management isn't enough. StrongDM Managed Secrets offers vault-agnostic, Zero Trust security with secretless access, dynamic policy enforcement, automated rotation, and unified audits—perfect for complex enterprise environments.