How to prevent permission bloat: Overlooked and hidden access - Help Net Security

How to prevent permission bloat: Overlooked and hidden access - Help Net Security

When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization can face – and it’s less of a stone and more of a somehow-overlooked, but ever-looming mountain.


As employees change roles within the organization (whether through promotions, role-changes, or due to temporary projects), they accumulate more access rights than they actually need. This is commonly referred to as “permission bloat” or “privilege creep”.


Your employees need access to certain resources to do their job, but if they acquire “too much” access, then they actually become a security risk. So how can we identify when an employee has too many access privileges?


Often times, taking a preemptive course of action is more effective than taking a reactive one, and that is true here. Rather than trying to identify when an employee ..

Support the originator by clicking the read the rest link below.