Identity & Access Management (IAM)
Active Ambassadors in This Topic
Community Posts
Non-human identities (NHIs), such as API keys, service accounts, and tokens, outnumber humans by 25 to 50 times and often go ungoverned. From Entro’s 2025 report:
• 90% have excessive permissions
• 44% are exposed in the wild
• 91% of stale secrets are never revoked
What helped us: inventory, assign owners, right-size access, monitor behavior, and test continuously.
How mature is your NHI program? Biggest barrier, tooling, ownership, or adoption?
Big Data16%
Remote Work19%
Microservices / Containerization13%
CI / CD7%
Zero-Trust15%
Automation2%
Digital Transformation17%
Cloud / Cloud Native2%
DevOps or DevSecOps3%
Other (comment)1%
Is the edge of your enterprise secure?
Yes75%
No10%
Working on it13%
We are currently in the process of implementing Opentext's Voltage Fusion to identify Permanent Account Numbers (PANs) in our unstructured data environment. Are there any recommendations regarding common file types that we should be scanning to look for this information? We were thinking of scanning csv, doc, docx, xlsx, xls, msg, pdf, txt, zip, xml, asc and accdb. Is there anything else that we should be looking for, or is this a good start?
My organization could be doing more to keep passwords safe.
Strongly Agree7%
Agree70%
Neutral22%
Disagree9%
Strongly Disagree