NHI Secrets
Use Veza to discover and manage credentials for non-human identity (NHI) accounts, including tokens, cryptographic keys, passwords, and certificates.
In Veza, an NHI secret is a piece of private data that grants access to resources, systems, and services. Non-human identities (like applications, functions, and other workloads) use secrets to authenticate and establish their permissions. Secrets typically have a fixed lifespan and are used at scale for programmatic access, with examples including:
Database connection strings and passwords
API keys for service-to-service communication
Service account credentials providing access to cloud resources
Cloud provider access keys that authorize infrastructure changes
SSH and TLS private keys for system access
Infrastructure automation tokens
Webhook signing secrets
Veza discovers and provides metadata about secrets across your cloud and application environments, enabling comprehensive visibility into security and compliance posture, including which non-human identities can access secrets, and how they are protected.
Supported Secrets
Secrets are represented in the Veza Graph as distinct entity types. When creating queries, you can select individual entity types or use top-level groupings to search for all entities of that category. For example, searching for Keys will include both AWS KMS Customer Master Keys and Azure Key Vault Keys in the results.
Secrets
Application-level secrets including credentials and sensitive configuration:
AWS Secrets Manager Secrets
Azure Key Vault Secrets
GitHub Secrets
HashiCorp Vault Secrets Engine Resources
Snowflake Secrets
Keys
Cryptographic keys used for data encryption:
AWS KMS Customer Master Keys
Azure Key Vault Keys
Google Cloud KMS Keys
Access Credentials
Long-lived authentication tokens and certificates:
AWS IAM Access Keys
Azure Key Vault Certificates
Azure Storage Account Access Keys
Custom Access Credentials (Open Authorization API)
GitHub Deploy Keys
GitHub Personal Access Tokens
Google Cloud Service Account Keys
Credential Lifecycle Management
Veza tracks metadata for secrets and credentials to help understand when keys were last used or last rotated:
Usage Tracking
The following credential types support last_used_at
tracking to identify stale or unused credentials:
AWS IAM Access Keys
AWS KMS Customer Master Keys
Azure Key Vault Keys
Azure Key Vault Secrets
Azure Storage Account Access Keys
GitHub Deploy Keys
GitHub Personal Access Tokens
GitHub Secrets
Google Cloud KMS Keys
Google Cloud Service Account Keys
HashiCorp Vault Secrets Engine Resources
Snowflake Secrets
Snowflake Users (with API/service access)
Rotation Tracking
The following secret types support last_rotated_at
tracking to ensure compliance with rotation policies:
AWS KMS Customer Master Keys
AWS Secrets Manager Secrets
Azure Key Vault Keys
Azure Key Vault Secrets
GitHub Secrets
Google Cloud KMS Keys
HashiCorp Vault Secrets Engine Resources
Snowflake Secrets
Use Query Builder to create queries that identify:
Credentials that haven't been used in 90+ days
Secrets that haven't been rotated according to policy
Active credentials without recent usage
Service accounts with multiple active keys
Last updated
Was this helpful?