Delegated admin and JIT access illustration

Delegated Admin & Just-In-Time Access: Reducing Standing Privileges

Delegated Admin & Just-In-Time Access: Reducing Standing Privileges TL;DR Standing (always-on) admin privileges are a top target for attackers—and a pain point for compliance. By shifting to delegated admin roles and “just-in-time” access, organizations reduce risk, limit attack surfaces, and enforce true least privilege in practice. This post unpacks how to design and run these controls, practical pitfalls, and the benefits for audit, security, and business agility. Why Standing Privileges Are a Problem Standing privilege means an account (often admin) always has elevated rights, even when not in use....

August 20, 2025 · 4 min · Everyday Identity

Access Reviews & Certifications: Why and How

Access Reviews & Certifications: Why and How Everything you need to know about periodic reviews, compliance value, and common traps to avoid TL;DR Access reviews and certifications are your IAM safety net. Done right, they ensure that users have only the access they need—no more, no less. In this post, we’ll explain the what, why, and how, along with real-world examples and common mistakes to avoid. What Are Access Reviews?...

August 6, 2025 · 3 min · Jay Klinkowsky

AI in IAM: Why Human-in-the-Loop Still Matters

TL;DR AI brings speed, scale, and intelligence to Identity and Access Management (IAM). But real-world breaches, compliance rules, and business complexity prove a critical truth: without a human-in-the-loop (HiTL), automation introduces unacceptable risks. This guide covers how AI is transforming IAM, what can go wrong, real-world incidents, case studies, key compliance requirements (SOX, HIPAA, GDPR, NIST, and more), and a downloadable mapping document for your security program. 1. Introduction: The New Age of IAM Automation Identity and Access Management (IAM) is now at the crossroads of AI, automation, and Zero Trust....

June 12, 2025 · 5 min · Jay Klinkowsky

Comprehensive Password and 2FA Identity Policy

Password Requirements Password Composition Minimum Length: All passwords must be at least 12 characters long. Longer passwords (16+ characters) are strongly encouraged. Character Requirements: Passwords must include at least: One uppercase letter (A-Z) One lowercase letter (a-z) One numeric digit (0-9) One special character (e.g., !@#$%^&*()_+-=[]{}|;:’",.<>/?`~) Complexity Enforcement: Password creation systems must validate these requirements in real-time and provide feedback to users. Dictionary Word Prevention: Passwords cannot consist solely of common dictionary words, regardless of character substitutions....

March 30, 2025 · 6 min · Jay Klinkowsky