Service Accounts Were a Shortcut—Now They’re a Liability. It’s time to go Accountless.

Pieter Kasselman

For years, we've relied on service accounts to represent non-human identities (NHIs)—applications, workloads, scripts, and services that need access to systems and data. It was a pragmatic decision. Service accounts were familiar, available, and fit easily into existing identity infrastructures.

Service Accounts - A Growing Security Risk

But what was once a convenient shortcut has become a security risk.

Unlike human accounts, service accounts don’t get deprovisioned with changes in ownership or when software gets decommissioned. Their privileges don’t change as a result of organizational changes. Instead they persist, are ungoverned and accumulate access over time—leaving gaps that attackers are increasingly exploiting. The security risks aren’t theoretical; they stem from structural weaknesses that result from using identity infrastructure that was designed for the human identity lifecycle as opposed to that of applications, services and workloads. As a result:

- Static credentials can be leaked, hardcoded, or forgotten in code repositories

- Over-permissioned access often goes unchecked, violating least privilege

- Lack of clear ownership causes accounts to persist long after they're needed

-Attackers exploit orphaned accounts, using them as backdoors into systems

In several high-profile cloud breaches, attackers gained access through forgotten service accounts with over-permissioned access and long-lived secrets. These real-world failures highlight how vulnerable traditional service account management has become.

Different Lifecycles, Different Systems

To understand why service accounts are failing us, we need to examine the identity lifecycles they were never designed for.

Human identity is typically driven by HR systems. Lifecycles are slow and predictable—changes are the result of human-scale events like onboarding, job changes, and terminations. Identity proofing is expensive and happens once, long lived credentials are issued, and access is granted based on relatively static roles.

Non-Human Identity (NHI), in contrast, is driven by engineering systems. Workloads are created and destroyed frequently, sometimes every minute. Ownership boundaries are fluid. NHIs don’t "leave the company," but their context, configuration, and scope of access change constantly. Identity proofing is cheap, can be done dynamically and should happen every time a workload runs. No need for long lived credentials and standing access.

Yet, we’ve been managing both through the same paradigm—account creation in a directory optimized for humans. That comes with baggage:

  • Long lived credentials: We provision long-lived secrets to workloads and then spend enormous effort protecting them.
  • Standing access: These accounts often retain broad permissions, even when rarely used.
  • Manual lifecycle management: Engineering teams don’t want to file tickets to decommission stale service accounts. So they linger—often forgotten, sometimes exploited.
  • Directories are optimized for read, not write: Engineering systems need fast, frequent identity operations. Traditional directories aren't built for that. Dynamically creating and deleting accounts will bring down a directory.

The Better Way: Accountless, Attestable Identities

Modern systems can do better. Workloads can now be attested at runtime—cryptographically proving their identity, origin, and integrity every time they start. This removes the need for long-lived credentials or manual provisioning.

The biggest driver for going accountless isn’t just convenience—it’s reducing the identity attack surface in dynamic environments where traditional service account hygiene breaks down.

In an accountless identity  model:

  • No accounts are created
  • No secrets are issued or stored
  • Authorization is tied to dynamic identity, not static accounts
  • Access is granted based on real-time context, not out-of-date assumptions

This is not just more secure—it’s more aligned with the reality of how workloads behave.

Old Paradigms, New Liabilities

Using service accounts was a pragmatic shortcut. It got us moving. But what was once a workaround is now technical debt. As workloads scale, as environments become more dynamic, and as attackers get more sophisticated, the weaknesses in the service account model are too dangerous to ignore.

It’s time to move forward.

Accountless identity is not just an evolution. It’s a recognition that non-human identities need their own system, built for their lifecycle, not inherited from humans.

Want to see how accountless identity works in practice? Visit SPIRL to learn more.