<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: RAJAT SHEORAN</title>
    <description>The latest articles on DEV Community by RAJAT SHEORAN (@rajat_sheoran).</description>
    <link>https://dev.to/rajat_sheoran</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3837648%2Fd8d80ad7-29de-47f8-b5b6-a00951a637f5.jpg</url>
      <title>DEV Community: RAJAT SHEORAN</title>
      <link>https://dev.to/rajat_sheoran</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/rajat_sheoran"/>
    <language>en</language>
    <item>
      <title>Non-Human Identity Governance in Advanced Manufacturing</title>
      <dc:creator>RAJAT SHEORAN</dc:creator>
      <pubDate>Sat, 21 Mar 2026 21:33:12 +0000</pubDate>
      <link>https://dev.to/rajat_sheoran/non-human-identity-governance-in-advanced-manufacturing-373d</link>
      <guid>https://dev.to/rajat_sheoran/non-human-identity-governance-in-advanced-manufacturing-373d</guid>
      <description>&lt;p&gt;In most identity programs, the focus is still on users. Access reviews, lifecycle management, role-based access, all of it is built around people.&lt;/p&gt;

&lt;p&gt;But in manufacturing environments, a large portion of activity does not come from users. It comes from systems.&lt;/p&gt;

&lt;p&gt;Machines, controllers, applications, and automation pipelines interact with each other constantly. Each of these interactions relies on some form of identity, even if it is not always labeled that way.&lt;/p&gt;

&lt;p&gt;The challenge is that these identities are not governed with the same discipline as human users.&lt;/p&gt;

&lt;h2&gt;
  
  
  What Counts as a Non-Human Identity Here
&lt;/h2&gt;

&lt;p&gt;In a manufacturing setup, non-human identities show up in different forms:&lt;/p&gt;

&lt;p&gt;service accounts used by applications&lt;br&gt;
credentials used by PLCs and industrial systems&lt;br&gt;
API keys between MES, ERP, and cloud platforms&lt;br&gt;
certificates used for machine communication&lt;br&gt;
identities used by automation and monitoring tools&lt;/p&gt;

&lt;p&gt;They are often created as part of system setup and then left unchanged for long periods.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Traditional Governance Does Not Fit Well
&lt;/h2&gt;

&lt;p&gt;Identity governance models assume structure. In manufacturing environments, things are usually more practical than structured.&lt;/p&gt;

&lt;p&gt;Ownership is not always clear&lt;/p&gt;

&lt;p&gt;A system may be set up by one team, supported by another, and used by a third. The identities tied to that system do not always have a clearly defined owner.&lt;/p&gt;

&lt;p&gt;Identities last longer than expected&lt;/p&gt;

&lt;p&gt;Machines and systems stay in place for years. Their credentials often stay the same. Even when systems are replaced, the identities are not always cleaned up properly.&lt;/p&gt;

&lt;p&gt;Stability is prioritized&lt;/p&gt;

&lt;p&gt;If something works, teams prefer not to change it. Updating credentials or tightening permissions can introduce risk, so it is often delayed.&lt;/p&gt;

&lt;p&gt;Not everything supports modern controls&lt;/p&gt;

&lt;p&gt;Some systems do not integrate easily with centralized identity platforms. They rely on static credentials or local configurations.&lt;/p&gt;

&lt;h2&gt;
  
  
  Common Issues That Show Up
&lt;/h2&gt;

&lt;p&gt;Across different environments, similar patterns tend to appear:&lt;/p&gt;

&lt;p&gt;credentials shared across multiple systems&lt;br&gt;
service accounts with more access than needed&lt;br&gt;
secrets stored in configuration files or scripts&lt;br&gt;
identities that are no longer used but still active&lt;/p&gt;

&lt;p&gt;These issues build up over time. Individually they may not seem critical, but together they increase risk.&lt;/p&gt;

&lt;p&gt;Static Credentials Are Still Common&lt;/p&gt;

&lt;p&gt;A lot of systems rely on credentials that do not change often.&lt;/p&gt;

&lt;p&gt;They are set once and reused:&lt;/p&gt;

&lt;p&gt;passwords&lt;br&gt;
API keys&lt;br&gt;
certificates&lt;/p&gt;

&lt;p&gt;This makes systems predictable, which is important for operations. But it also means that if a credential is exposed, it can be used for a long time.&lt;/p&gt;

&lt;p&gt;Moving away from this model is not always straightforward. Some systems simply do not support more dynamic approaches.&lt;/p&gt;

&lt;h2&gt;
  
  
  What can be done?
&lt;/h2&gt;

&lt;p&gt;There is no single solution that fixes everything. But a few practical steps can improve the situation.&lt;/p&gt;

&lt;h2&gt;
  
  
  Get a basic inventory
&lt;/h2&gt;

&lt;p&gt;Start by understanding what exists.&lt;/p&gt;

&lt;p&gt;Look at:&lt;/p&gt;

&lt;p&gt;cloud IAM systems&lt;br&gt;
secrets management tools&lt;br&gt;
application configurations&lt;br&gt;
integration points between systems&lt;/p&gt;

&lt;p&gt;The goal is not perfection. It is visibility.&lt;/p&gt;

&lt;h2&gt;
  
  
  Assign ownership at a system level
&lt;/h2&gt;

&lt;p&gt;Instead of trying to track ownership for every identity, assign ownership for systems.&lt;/p&gt;

&lt;p&gt;For example, a production line or application stack should have a responsible team. That team is then accountable for the identities used within it.&lt;/p&gt;

&lt;h2&gt;
  
  
  Reduce obvious over-permission
&lt;/h2&gt;

&lt;p&gt;Trying to implement perfect least privilege all at once usually fails.&lt;/p&gt;

&lt;p&gt;Start with:&lt;/p&gt;

&lt;p&gt;identities that have very broad access&lt;br&gt;
permissions that are clearly not needed&lt;/p&gt;

&lt;p&gt;Make incremental improvements.&lt;/p&gt;

&lt;h2&gt;
  
  
  Improve how secrets are handled
&lt;/h2&gt;

&lt;p&gt;Where possible:&lt;/p&gt;

&lt;p&gt;move credentials out of code and into secure storage&lt;br&gt;
use centralized secrets management&lt;br&gt;
introduce rotation for higher-risk credentials&lt;/p&gt;

&lt;p&gt;This does not have to happen everywhere at once.&lt;/p&gt;

&lt;h2&gt;
  
  
  Monitor usage patterns
&lt;/h2&gt;

&lt;p&gt;In environments where configurations do not change often, behavior becomes a useful signal.&lt;/p&gt;

&lt;p&gt;Look for:&lt;/p&gt;

&lt;p&gt;unexpected connections between systems&lt;br&gt;
unusual access patterns&lt;br&gt;
identities being used in ways they were not intended for&lt;/p&gt;

&lt;p&gt;This can help detect issues that static reviews miss.&lt;/p&gt;

&lt;h2&gt;
  
  
  Align with existing workflows
&lt;/h2&gt;

&lt;p&gt;Any governance control that slows down operations will be resisted.&lt;/p&gt;

&lt;p&gt;Instead of adding separate processes, integrate identity management into:&lt;/p&gt;

&lt;p&gt;deployment workflows&lt;br&gt;
system provisioning&lt;br&gt;
automation pipelines&lt;/p&gt;

&lt;p&gt;This makes controls easier to apply consistently.&lt;/p&gt;

&lt;p&gt;Where Things Usually Get Stuck&lt;/p&gt;

&lt;p&gt;Most organizations recognize the problem, but progress is uneven.&lt;/p&gt;

&lt;p&gt;Security teams want stronger controls.&lt;br&gt;
Operations teams want stability.&lt;/p&gt;

&lt;p&gt;Both are valid concerns.&lt;/p&gt;

&lt;p&gt;If controls are too strict, they can impact production. If they are too relaxed, risk increases over time.&lt;/p&gt;

&lt;p&gt;Finding the balance is an ongoing process.&lt;/p&gt;

&lt;h2&gt;
  
  
  Looking Ahead
&lt;/h2&gt;

&lt;p&gt;Manufacturing environments are becoming more automated. Systems are making more decisions without human involvement.&lt;/p&gt;

&lt;p&gt;This will increase the number of non-human identities and the level of access they require.&lt;/p&gt;

&lt;p&gt;Governance will need to adapt, but it does not need to be overly complex.&lt;/p&gt;

&lt;p&gt;Clear ownership, better visibility, and gradual improvements in how identities are managed can go a long way.&lt;/p&gt;

&lt;h2&gt;
  
  
  Final Thoughts
&lt;/h2&gt;

&lt;p&gt;Non-human identities in manufacturing are not new, but they are becoming more important.&lt;/p&gt;

&lt;p&gt;The goal is not to apply enterprise IAM models directly, but to adapt the principles in a way that fits how these environments operate.&lt;/p&gt;

&lt;p&gt;Small, consistent improvements tend to work better than large, disruptive changes.&lt;/p&gt;

</description>
      <category>identity</category>
      <category>iot</category>
      <category>cybersecurity</category>
      <category>nhi</category>
    </item>
  </channel>
</rss>
