Non-Human Identities (NHI) are pivotal in driving automation and facilitating seamless integration across cloud services, SaaS platforms, and on-premises applications. With the rising prevalence of NHIs in modern ecosystems, implementing robust management and security protocols is vital to protect against unauthorized access and mitigate potential security risks. There are three aspects of an NHI that need to be managed and secured: 1. Authentication - credential management; 2. Authorization - roles and permissions; 3. Securing the client - system or application where the NHI is used In this session, we will discuss how most approaches today are focused on the single dimension of authentication, which includes NHI discovery, key rotation, and lifecycle. The other two are often neglected. This results in a significant security exposure for the enterprises. We will present a model of classifying NHIs based on who is responsible for managing the credentials and permissions between cloud providers and enterprises. We will then discuss which aspects of security are relevant for each NHI type and provide recommendations for securing them.