Secure Code & Automation (DevSecOps)
Active Ambassadors in This Topic
Community Posts
Non-human identities (NHIs), such as API keys, service accounts, and tokens, outnumber humans by 25 to 50 times and often go ungoverned. From Entro’s 2025 report:
• 90% have excessive permissions
• 44% are exposed in the wild
• 91% of stale secrets are never revoked
What helped us: inventory, assign owners, right-size access, monitor behavior, and test continuously.
How mature is your NHI program? Biggest barrier, tooling, ownership, or adoption?
Yes, always32%
Sometimes58%
No8%
Unsure1%
Always23%
Often46%
Sometimes20%
Rarely10%
Never1%
How do you encourage your software staff to follow security best practices? Have you ever had problems with developers who aren’t following formal security processes after they’re in place?
How do you encourage your software team to work collaboratively on security — both within the team and with other departments?
Do you have an AI application security program?
Yes36%
We’re currently considering it50%
We’re currently developing one7%
No6%