Originally published on opena2a.org

Why Your NHI Strategy Doesn't Cover AI Agents

Abdel Fane|
#nhi#ai-agents#governance#security#enterprise

If you're a CISO or security architect, you've probably heard of Non-Human Identity (NHI) governance. You might even have a platform in place -- Oasis, Entro, Astrix, or Clutch. These tools manage your service accounts, API keys, OAuth tokens, and SSH keys across cloud environments.

But here's the uncomfortable truth: your NHI strategy has a blind spot. AI agents are the fastest-growing class of non-human identity in your organization, and your current tools weren't designed to govern them.

The NHI Market Is Booming -- But Missing the Point

The NHI security market has exploded. Over $400 million in venture funding flowed into NHI platforms in 2025 alone. Non-human identities outnumber human identities 45:1 in the average enterprise.

Traditional NHI platforms do excellent work managing service accounts. But they all share a common assumption: non-human identities execute fixed, predictable operations.

AI Agents Are a Different Class of NHI

AI agents don't just authenticate and execute a predetermined operation. They reason. They make decisions. They call tools dynamically based on context.

CharacteristicTraditional NHIAI Agent
BehaviorFixed, deterministicDynamic, context-dependent
CapabilitiesStatic permissionsDrift over time
Tool accessPredefined API endpointsMCP servers with changing tools
InteractionsService-to-serviceAgent-to-agent (A2A)
Decision-makingNoneAutonomous reasoning
Attack surfaceCredential theftPrompt injection, tool misuse, capability drift

The Questions Your NHI Platform Can't Answer

What capabilities does this agent actually use at runtime?

Traditional NHI tools see static permissions. Agent behavior is dynamic.

Has this agent's behavior drifted from its declared purpose?

An agent might be approved for "customer support" but start accessing financial data.

Which MCP servers is this agent connected to, and have their tools changed?

MCP servers can add new tools at any time. Your agent's attack surface expands silently.

If this agent is compromised, what's the blast radius?

Agents interact with other agents. A single compromised agent can cascade.

Who is accountable for this agent's actions?

Service accounts are typically owned by teams. Agents often have no clear owner.

The Agent NHI Gap

What traditional NHI sees

  • An API key was created
  • The key has access to OpenAI
  • Last used: 3 minutes ago
  • Owner: unknown

What agent governance sees

  • Agent: customer-support-bot
  • Owner: jane.doe@company.com
  • Capabilities: db:read, api:call
  • Trust score: 87/100 (declining)
  • MCP servers: 2 attested, 1 drifted
  • Behavior: accessing financial tables (unusual)

What Agent NHI Governance Actually Requires

Cryptographic agent identity

Not just API keys -- Ed25519 keypairs with challenge-response authentication. Post-quantum cryptography (ML-DSA) for future-proofing.

Capability-based access control

Agents declare what they can do (db:read, api:call, file:write). Every action is checked against declared capabilities at runtime.

MCP server attestation

Cryptographic fingerprints of MCP server tool surfaces. Automatic drift detection when tools change.

Behavioral trust scoring

Not a static risk rating -- a continuous 8-factor trust score that adapts based on agent behavior.

Ownership and lifecycle management

Every agent linked to a human owner. Automated lifecycle transitions. Orphan detection when owners leave.

Complementary, Not Competitive

This isn't about replacing your existing NHI platform. Many enterprises will run both:

  • Traditional NHI platform for service accounts, API keys, OAuth tokens
  • Agent NHI platform for AI agents, MCP servers, A2A interactions

What You Can Do Today

1

Inventory your AI agents

How many AI agents are running in your organization? Who deployed them? What do they access?

2

Map your MCP servers

Which MCP servers exist in your environment? Are they registered? Attested?

3

Evaluate agent-native governance

Look for platforms purpose-built for AI agent identity -- not service-account platforms with agent features bolted on.

4

Start with visibility

You can't govern what you can't see. Begin by getting visibility into agent deployments.

Close the Gap in Your NHI Strategy

AIM is the open-source NHI platform purpose-built for AI agents. Cryptographic identity, capability-based access control, MCP attestation, and full lifecycle governance.