Page 141 - Cyber Defense eMagazine September 2025
P. 141

Dormant  Access  and  the  Hidden  Risk  inside  your  IAM

            Program



            By  Durgaprasad  Balakrishnan,  Independent  Cybersecurity  Researcher  and  Director  of
            Cybersecurity – Identity and Access Management at a Leading Global Fintech Company



            Dormant access refers to any account or entitlement that keeps its privileges but shows no sign of use
            for an extended period. This can be a domain admin that has not logged on in 90 days, a Linux service
            account which was never used after it was created or a SaaS admin role that never calls the API it was
            created to manage. They are still authorized, valid and still sitting there unused.

            Dormancy can be classified into the following buckets:

               1.  Human accounts - No interactive logon, MFA push or token refresh for X days (often 60–90
                   days).
               2.  Service and machine identities - No process start, keytab request or secret rotation in Y days
                   (commonly  120–180  days).  This  can  also  include  the  container  image  or  VM  which  was
                   decommissioned, but it’s service principal still lives in the vault.
               3.  Entitlements and roles - The account logs in, but the specific entitlement (admin role, S3 bucket
                   policy, sudo rule) has not been exercised within the threshold.







            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          141
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   136   137   138   139   140   141   142   143   144   145   146