CyberGlossary

Identity & Access

Service Account

Also known as: Non-human identity, Application account

Definition

A non-human identity used by an application, script, or service to authenticate to other systems, typically without interactive login.

A service account represents a workload rather than a person. It is provisioned for backend processes that need to call databases, APIs, message queues, or operating-system services — for example, a backup job, a Kubernetes pod, or a SaaS connector. Service accounts often hold long-lived secrets (passwords, API keys, certificates) and broad permissions, which makes them attractive lateral-movement targets when poorly managed. Best practices include strong vaulting, automated rotation, scoped permissions following least-privilege, workload identity federation in cloud environments (so credentials are short-lived), audit logging, and removing standing keys in favour of OIDC or mTLS-based authentication.

Examples

  • A Kubernetes ServiceAccount used by a pod to call the cluster API with limited RBAC permissions.
  • An Azure managed identity that allows a virtual machine to read from Key Vault without storing secrets.

Related terms