Last Updated on 05/03/2022 by Nidhi Khandelwal
In the middle of ‘The Great Resignation,’ the damage caused by workers (or contractors) departing a business could be one of the most significant threats facing IT departments today. User onboarding and offboarding are an everyday occurrence in today’s dynamic workplace computer environment.
It’s easy to lose track of who’s coming and going when staff counts reach the five-figure range — and entire networks of contractors must be accounted for as well. Offboarding processes are frequently overlooked – simply disconnecting or deleting the user from Active Directory or IAM is insufficient because the user may have local credentials on some SaaS platforms or other sensitive systems.
Technically, offboarding can be automated utilizing protocols like SCIM and JIT mapping; however, this requires a high level of maturity in an IT system as well as the personnel to implement it.
Offboarded personnel may still have local credentials on some of their routinely used SaaS platforms or other sensitive systems in firms that do not use SCIM or JIT. Allowing these users to have their access opens the door to unauthorized data access.
When it comes to deprovisioning (removing outdated users from systems), there are a few best practices to keep in mind and follow.
Maintain an Inventory – It’s critical that IT teams have an up-to-date list of all users with access to firm systems at all times. It is necessary to create a line of contact with human resources in order to stay informed about events that affect the user inventory, such as employee terminations. These systems must be capable of analyzing both internal and external users in order to be effective from a security standpoint. The vendor landscape might be ever-changing.