Please ensure Javascript is enabled for purposes of website accessibility

Active Identity of Departed Employee

Risk Category

Lifecycle Management

Risk Description

Learn how former employees' NHIs can create high security risks and how to remove their access with smart lifecycle management.

Why It’s a Risk

If these identities are not immediately revoked, they can be exploited by malicious actors, leading to unauthorized access to systems. Former employees with lingering access could intentionally or unintentionally expose data or compromise system integrity, posing severe financial, operational, and reputational damage.

Likelihood of Occurrence

high

High, especially if offboarding processes are not automated or routinely audited.

Impact Level

high

High, as it can lead to unauthorized access, data breaches, and potential insider threats.

Mitigation Strategy

Implement continuous NHI monitoring and lifecycle management to ensure timely deactivation of credentials immediately after employee offboarding. Regular audits and enforcing a Zero Trust model validate all access requests, preventing any unauthorized access by former employees.

Playbooks in Clutch

110

Applies for:

Cloud Service Provider

AWS
Azure
Google Cloud Platform

Vault

AWS Secrets Manager
GCP Secret Manager
Hashicorp Vault

Source Manager

Bitbucket
GitHub
GitLab

CI/CD

CircleCI
GitHub Actions
Jenkins
TeamCity

Password Manager

1Password
LastPass

EDR

Crowdstrike
SentinelOne
Microsoft Defender

Data

AWS Redshift
MongoDB Atlas
MySQL
PostgreSQL
Snowflake

Network

Akamai
Cloudflare

PaaS

Azure Kubernetes Service
Amazon Elastic Kubernetes Service
Google Kubernetes Engine
Kubernetes

Collaboration

Atlassian Confluence
Notion

Project Management

Atlassian Jira

Log Analytics

Datadog
Elastic
Splunk

IDP

Google Workspace
JumpCloud
Microsoft Entra ID
Okta

CRM

Hubspot
Salesforce

MDM

Microsoft Intune
Jamf

IM

Microsoft Teams
Snowflake

Ticketing

ServiceNow
Zendesk

Automation

Tines
Torq

HRIS

BambooHR
HiBob

SIEM

Exabeam (Logrhythm)
Sumo Logic

Stay Secure Without the Hassle of Rotations: Clutch’s Zero Trust & Ephemeral Identity Approach.