Menu
Discuss a project
Book a call
Back
Discuss a project
Book a call
Back
Back
Articles
8 MIN READ

AI Runs on Identity: Why Identity Hygiene is the Missing Layer in AI Adoption

Identity sprawl is one of the biggest blockers for AI adoption. This guide helps you understand it so you can build identity foundations ready for AI.

"Non-human identities are the new frontier of identity security. The question is no longer whether to govern them — it's whether you can afford not to."Tal Skverer, Co-founder, OWASP NHI Top 10 project

Introduction: AI Runs on Identity

At AWS Summit, one theme was clear: organisations are accelerating AI adoption, but many are doing so on identity foundations that weren’t designed for it.

From intelligent automation to autonomous agents, systems are becoming faster, more adaptive, and more interconnected.

But every AI system - agent, pipeline, or model - relies on something fundamental:

Identity.

Every AI-driven system interacts with APIs, accesses data, and executes actions across platforms. To do this, it depends on non-human identities (NHIs).

As AI adoption grows, so does the number of these identities, often far beyond what traditional identity practices were designed to handle. The result is identity sprawl: a rapidly expanding estate of unmanaged, unowned, and over-privileged machine credentials.

Understanding Identity Sprawl

Identity sprawl happens when machine identities grow faster than governance can keep pace.

Every new AI agent, cloud integration, or automation pipeline introduces new credentials. Individually, they seem harmless. Collectively, they create a landscape of access that no single team fully owns or understands.

Sprawl isn’t carelessness; it’s a byproduct of moving fast.

Common patterns include:

  • Credentials that outlive the workloads that created them
  • Service accounts with no clear ownership
  • Permissions granted broadly and never revisited
  • Credentials reused across services or environments
  • AI agents operating with more access than required

Sprawl is not a permanent condition; it’s a starting point.

At Colibri Digital, we see identity sprawl as one of the biggest hidden blockers to scaling AI safely, not because organisations lack controls, but because those controls weren’t designed for machine-scale identity.

The Invisible Foundation: Machine Identities at Scale

In modern environments, machine identities already outnumber human users, often by more than 100:1.

These include:

  • Service accounts
  • API keys
  • CI/CD tokens
  • Containers and microservices
  • AI agents

Unlike human identities, they:

  • Operate continuously
  • Are created rapidly
  • Require clear ownership and lifecycle management

This means there is an opportunity to apply structured identity practices to the fastest-growing layer of access.

OWASP NHI Top 10: A Practical Guide

The OWASP Non-Human Identity Top 10 isn’t just a risk list; it’s a blueprint for AI-ready identity.

It highlights recurring failure points and, more importantly, what good looks like:

Key Statistics

The scale of the NHI challenge is best understood through the numbers:

Understanding the Key Areas

These three areas form the basis of identity hygiene:

Why this Matters for AI

AI systems don’t just consume data; they act.

CI/CD pipelines powering AI systems are identity-bearing systems. Autonomous agents execute infrastructure changes. Models trigger workflows across environments.

Autonomous AI systems act only through the identities assigned to them, and those identities define both capability and risk.

Two real-world examples highlight this:

  • In the Microsoft Storm-0558 breach 2023, attackers forged authentication tokens using a compromised signing key, enabling unauthorised access to sensitive government communications
  • In the Aura data breach 2026, a single compromised employee identity enabled access to hundreds of thousands of records

In both cases, identity, and not code, defined the blast radius.

The shape of your identity architecture is the shape of your AI risk.

From Credentials to Identity: A Modern Approach

A key theme in identity hygiene is moving away from static credentials.

Across AWS environments, this means:

  • Using IAM roles and federation instead of static keys
  • Adopting short-lived credentials by default
  • Designing access around workloads, not systems

What Identity Hygiene Means in Practice

Identity hygiene is about clarity and consistency.

It ensures that:

  • Every identity has a defined owner
  • Every credential has a lifecycle
  • Every permission aligns with a specific purpose
  • Every access is time-bound where possible

When these principles are applied, identity becomes an enabler and not a constraint.

Colibri’s 4-stage Model for Identity Hygiene

A structured approach helps organisations move from sprawl to control, and that’s exactly what we deliver at Colibri Digital.

1. Discover: Build Visibility

  • Identify all machine identities
  • Map ownership and usage
  • Understand access patterns

2. Refine: Improve Foundations

  • Remove unused identities
  • Update credential lifecycles
  • Align permissions with purpose

3. Evolve: Adopt Modern Identity Models

  • Introduce short-lived credentials
  • Use workload-based identity
  • Reduce reliance on stored secrets

4. Sustain: Establish Continuous Governance

  • Monitor identity behaviour
  • Conduct regular access reviews
  • Maintain ownership accountability
  • Apply guardrails for consistency

From Access to Insight: Designing Identity for AI-Scale Systems

As environments scale, identity needs to move beyond static control and towards continuous insight.

Identity Observability

Visibility becomes essential as identity volume and complexity increase.

Strong identity practices include:

  • Monitoring how identities are used: Provides real-time visibility into behaviour, enabling faster detection of misuse or drift.
  • Comparing assigned permissions with actual usage: Identifies over-privileged identities and supports continuous least-privilege enforcement.
  • Detecting unusual patterns of access: Enables early identification of anomalies, reducing the likelihood and impact of breaches.
  • Continuously validating trust: Ensures access decisions remain context-aware and aligned with current risk levels.

 

This creates a shift from static access to dynamic insight.

Designing for Resilience

The shape of your identity architecture is the shape of your blast radius.

The goal is to ensure that systems remain stable and predictable under all conditions.

Separating Human and Machine Identities

Clear separation between identity types is essential.

When machine identities are used appropriately:

  • Human access remains governed by strong authentication controls
  • Machine access remains automated and auditable
  • Accountability and traceability are preserved

 

This clarity strengthens the overall identity posture.

Why this Matters for AI

AI systems depend on continuous access, real-time decisions, and scalable interactions.

Identity hygiene supports this by providing:

  • Structured access controls
  • Reliable trust boundaries
  • Scalable identity management

This transforms identity from a constraint into an enabler.

Case Studies: Identity in Modern Automation and AI Systems

Modern systems rely heavily on automation, pipelines, and AI-driven agents. These systems operate using non-human identities, making identity design central to system behaviour.

Case study 1: GitHub Actions supply chain incident - March 2025

A widely used GitHub Action (tj-actions/changed-files) was compromised across more than 23,000 repositories.

Attackers stole a single Personal Access Token tied to an automated bot account and injected malicious code that silently dumped CI/CD secrets - API keys, cloud credentials, access tokens - directly into public workflow logs.

The attack ran undetected for nearly 22 hours. CISA issued an immediate advisory (CVE-2025-30066).

Identity insight: CI/CD pipelines are identity-bearing systems. When identity boundaries are clearly defined - through scoped permissions and short-lived tokens - the impact of such incidents can be significantly reduced.

Case study 2: AI agents and autonomous infrastructure actions - December 2025

A separate scenario involving AI-driven agents demonstrated how autonomous systems interact with infrastructure.

AI agents managing cloud resources executed actions that resulted in the removal of active production instances.

Identity insight: AI systems act through the identities assigned to them. With clearly defined identity controls,scoped permissions, environment-aware access, and approval workflows, organisations can enable autonomy while maintaining control.

Understanding Identity Improvement Opportunities

As organisations scale AI, automation, and cloud-native architectures, identity expands alongside them. This growth reveals where identity practices can evolve to better support scale, control, and resilience.

In practice, these signals tend to cluster around a few recurring patterns:

  • Identities that outlive the workloads they support
  • Lack of clearly defined ownership and accountability
  • Permissions extending beyond actual usage
  • Credentials reused across services or environments
  • Blurred boundaries between human and machine access

Individually, these patterns are expected in fast-moving environments. Collectively, they point to a deeper issue: identity design hasn’t kept pace with the systems it supports.

As AI systems scale, these gaps don’t remain isolated. Autonomous agents, pipelines, and integrations amplify them, turning small inconsistencies into broader risk.

The opportunity isn’t to address each pattern in isolation, but to take a structured and consistent approach to identity hygiene, one that aligns identity design with how modern systems actually operate.

From Identity Sprawl to AI Readiness

As AI adoption accelerates, identity becomes increasingly central and increasingly complex.

The question is no longer:  

“Do we have access controls?”

But:  

“Are our identities structured, governed, and aligned to how our AI systems operate?”

Identity hygiene is not a one-off project. It’s an ongoing discipline, one that compounds in value as AI scales.

Organisations that invest in it can:

  • Scale AI with confidence
  • Reduce and contain identity sprawl
  • Maintain consistent control
  • Build systems that are both agile and resilient

How Colibri Can Help

At Colibri Digital, we help organisations build identity foundations that are ready for AI.

We work with clients to:

  • Discover and map non-human identities across cloud and AI environments
  • Design workload identity models aligned to AWS best practices
  • Implement least-privilege access at scale
  • Establish continuous identity governance

If you're scaling AI and want to ensure your identity foundations can support it, we’d be happy to share what we’re seeing across the market. Contact our team today.