Just like user names and passwords authorize access to humans, keys and certificates act as machine identities that authorize and validate machine access to valuable data.
However, in many ways protecting the identities of machines is more challenging than protecting those of humans. Machines may not see subtle red flags. And they don’t act on intuition. So, they may not easily identify machine identity threats. It’s your job to take care of all of that for them.