Want to get the most out of ChatGPT?
ChatGPT is a superpower if you know how to use it correctly.
Discover how HubSpot's guide to AI can elevate both your productivity and creativity to get more things done.
Learn to automate tasks, enhance decision-making, and foster innovation with the power of AI.
The most dangerous access in your organization is the access you don’t even remember granting.And in most companies, that access is tied to roles and entitlements designed years ago, for a world that doesn’t exist anymore.
The Ghosts of Access Past
In the early days of an IAM program, role design feels clean and logical. You map job titles to access needs. You group permissions into tidy bundles. You document who gets what. It feels orderly, and for a while, it works.
But then the business changes.
Departments merge. New product lines launch. Old ones get shut down. People move between roles, sometimes taking access with them that no longer matches their job. Systems are added, replaced, or retired. And through it all, those original roles remain in the IAM system — quietly provisioning access to applications, databases, and shared drives that may no longer even be relevant.
The result is a landscape of stale but still active entitlements. In many organizations, these outdated roles are still the primary driver of access. They continue to grant permissions based on yesterday’s org chart, even as the business has moved on.
The Birth of Permission Creep
This is where permission creep sets in. When someone moves to a new role, it’s often easier to add the new access they need than to remove the old access they no longer use. Especially if no one is sure whether removing it will break something important.
Over time, users accumulate more and more entitlements — a “permissions snowball” that keeps growing as their career progresses. By the time someone becomes a senior leader or technical specialist, they may have accumulated a decade’s worth of access, much of it completely unnecessary for their current role.
This isn’t just untidy. It’s dangerous.
The biggest problem with legacy access is that it hides in plain sight. If the role is still in the system, it’s assumed to be valid. Access certifications often rubber-stamp it because “that’s the role they’ve always had.” No one questions whether the role itself is still appropriate — they just focus on whether the person in the role should keep it.
And because these roles are usually broad, they often grant access to sensitive systems and data that fall well outside the user’s current responsibilities. That makes them prime targets for attackers. If a bad actor compromises one of these accounts, they inherit all that accumulated access — often without triggering alarms.
The False Comfort of Compliance
One of the most frustrating aspects of legacy access is how well it can hide behind compliance. You can pass an audit with flying colors while still carrying massive amounts of unnecessary access.
That’s because compliance checks often focus on whether a process exists — not whether it’s working effectively. If your access review process signs off on outdated roles, your auditors won’t complain. But the risk is still there, and it’s still growing.
This is the compliance trap: believing that because you passed the test, your access is under control. In reality, you may have simply inherited the assumptions — and the risks — of a role model designed in another era.
But modernization will solve all of this….right……RIGHT!?
Modernizing role models isn’t just hard — it’s disruptive. Every outdated role is like a knot in a tangled rope: pull on one and you risk unraveling a dozen dependencies. The longer those roles have been in place, the more business processes and workarounds have grown around them.
I’ve seen modernization projects stall because the moment you start deconstructing a role, you discover it’s tied to legacy apps, downstream automation, and security controls that no one wants to break. In those situations, it feels safer to leave the role alone — even if you know it’s granting too much access.
This is how organizations get stuck. The role model becomes sacred, not because it’s right, but because it’s dangerous to touch.
Breaking the Legacy Access Cycle
To move forward, you have to stop treating roles as permanent fixtures. Roles are just tools — and like any tool, they need to be replaced or redesigned when they’re no longer fit for purpose.That starts with visibility. You can’t fix what you can’t see. You need clear reporting on every role in your environment: what permissions it grants, who has it, how often those permissions are actually used. Without usage data, you’re flying blind.
Once you have visibility, you can start to prioritize. Which roles are clearly over-privileged? Which grant access to systems no longer in use? Which have the widest reach into sensitive data? These become your candidates for redesign.
And then comes the hard part: retiring or rebuilding them. This isn’t a one-time cleanup. It’s an ongoing process of tightening entitlements, aligning them to real business needs, and — most importantly — removing access when it’s no longer justified.
Final Thought: Don’t Let the Past Dictate Your Risk
Legacy access is identity debt at its most invisible — and its most dangerous. It doesn’t look broken. It doesn’t set off alarms. It often doesn’t even get flagged in audits. But it’s there, quietly inflating your risk exposure every day.
The longer you leave outdated roles in place, the harder they are to change. And the more you let yesterday’s access decisions dictate today’s reality, the further you drift from the principle of least privilege. Your role model isn’t just a record of how things were. It’s a blueprint for how access works right now. If that blueprint is out of date, so is your security.
The past will always try to pull your IAM program backwards. Your job is to keep pulling it forward.