Delegated admin and JIT access illustration

Delegated Admin & Just-In-Time Access: Reducing Standing Privileges

Delegated Admin & Just-In-Time Access: Reducing Standing Privileges TL;DR Standing (always-on) admin privileges are a top target for attackers—and a pain point for compliance. By shifting to delegated admin roles and “just-in-time” access, organizations reduce risk, limit attack surfaces, and enforce true least privilege in practice. This post unpacks how to design and run these controls, practical pitfalls, and the benefits for audit, security, and business agility. Why Standing Privileges Are a Problem Standing privilege means an account (often admin) always has elevated rights, even when not in use....

August 20, 2025 · 4 min · Everyday Identity

IAM in the Cloud & SaaS Era: Tackling Shadow IT, API Sprawl, and Access Chaos

#IAM in the Cloud & SaaS Era: Tackling Shadow IT, API Sprawl, and Access Chaos TL;DR As enterprises shift further into cloud and SaaS ecosystems, identity and access management (IAM) becomes a tangled web of apps, permissions, and overlooked risks. This post outlines the top threats—like Shadow IT and API sprawl—and offers strategies to maintain control. The Identity Challenge in a Cloud-First World Modern enterprises are no longer running a single stack—they’re running hundreds....

August 20, 2025 · 4 min · Jay Klinkowsky

What Does an IAM Manager Actually Do?

What Does an IAM Manager Actually Do? First-Hand Insights from a 15-Year IAM Pro Introduction Fifteen years ago, I stumbled into Identity and Access Management (IAM) when “cloud SSO” was still a buzzword and the biggest access threat was a sticky note password. Fast-forward to today, and I manage an IAM team responsible for protecting thousands of users, devices, and applications. If you’re wondering what an IAM Manager actually does—and what it takes to thrive in the role—this post is for you....

July 1, 2025 · 4 min · Jay Klinkowsky

Access Provisioning and Deprovisioning Policy

Access Provisioning and Deprovisioning Policy Overview This policy establishes the requirements and processes for securely granting, modifying, and revoking access to company systems, applications, and data—for all identities, both human and non-human (e.g., API accounts, service accounts, bots). Its goal is to minimize unauthorized access risk, support compliance, and ensure all access is appropriate for the assigned purpose. Scope This policy applies to all information systems, applications, data, and resources owned, managed, or controlled by the company....

4 min · Jay Klinkowsky

Least Privilege and RBAC Policy

Least Privilege and Role-Based Access Control (RBAC) Policy Overview This policy enforces the principle of least privilege and establishes role-based access control (RBAC) standards for all identities—human and non-human—across company systems, applications, and data. Its objective is to minimize risk, reduce the attack surface, and ensure that each identity is granted only the minimum access required for their legitimate business function. Scope This policy applies to all users (employees, contractors, third parties) and non-human identities (service accounts, APIs, automation bots, application integrations, etc....

3 min · Jay Klinkowsky