Identity Lifecycle Management: From Hire to Retire
Note: This is general information and not legal advice.
On this page
Executive Summary
- 38% of all accounts are dormant, and 16.5% of permissions belong to inactive users (Veza 2025).
- Credential abuse initiates 22% of all breaches (Verizon DBIR 2025).
- 99% of identity attacks use password-based methods (Microsoft Digital Defense Report 2024).
- When you can't answer "who approves access?" or "what happens to their data?" without scrambling.
- When departures happen faster than IT can revoke access.
- Before audits, insurance renewals, or customer questionnaires ask for termination controls.
- Pre-hire approvals happen before day one, with RBAC models documented and approved.
- Onboarding is automated where possible (SCIM provisioning, MFA enrollment, device pairing).
- Role changes follow "remove before add" discipline with 30/60-day re-certification.
- Offboarding happens on a defined schedule with evidence captured at each step.
- We map your current state: who owns each stage, where gaps exist, what applications support automation.
- We build repeatable workflows with explicit accountability, defined timelines, and evidence capture.
- We connect identity lifecycle to device and application lifecycle so nothing falls through the cracks.
- Identity lifecycle is managed across our Managed IT (day-to-day provisioning) and Managed Security (access reviews, orphaned account detection) services.
Pre-hire & Planning: Who decides what access is needed?
The lifecycle starts before the employee's first day. Pre-hire planning answers foundational questions that most organizations don't document until after something breaks: who approves access for this role, what's the RBAC model, and who decides what permissions each role gets.
- → Who approves permissions for this role?
- → What is the RBAC model and where is it documented?
- → Which applications require manual setup vs automated provisioning?
Hiring Manager
Defines role and initiates access request
Department Heads
Approve permissions for their systems
Security / Compliance
Review high-privilege requests
IT
Maintain RBAC documentation
RBAC model documentation
Role definition
What groups does this role belong to, what applications does it need, and what data classifications can it access?
Prevent privilege creep
Avoid "cloned access" where new hires inherit whatever permissions the previous person had.
Application inventory checklist
- → Does it support SCIM or API-based provisioning?
- → What's the manual process if automation isn't available?
- → What's the lead time for licenses, hardware, or special access?
- → Who owns manual account creation and what's the backup plan?
Onboarding (Joiners): Day-one readiness and MFA enrollment
Onboarding should be automated where possible and checklist-driven where automation isn't available. The goal is day-one readiness: the new hire can be productive immediately without chasing IT for basic tools.
- → Account created via Identity Provider (IdP) with role-based group membership
- → MFA enrollment completed before accessing any company systems
- → Device enrolled in MDM, encrypted, and configured with required policies
Account creation best practices
Use IdP as source of truth
Don't create accounts directly in each application. Use the Identity Provider with role-based group membership.
Enable SCIM where available
If applications support SCIM provisioning, enable it. Document manual processes for apps that don't.
MFA enrollment: non-negotiable on day one
Every user should enroll in Multi-Factor Authentication before accessing any company systems. For admins and high-privilege roles, require phishing-resistant methods (FIDO2/WebAuthn, device-bound passkeys) where possible. 99% of identity attacks use password-based methods.
Device enrollment checklist
Role Changes (Movers): Remove before add, then re-certify
Role changes are where privilege creep accumulates fastest. When someone shifts into a new role, the default behavior is to add new permissions without removing old ones. After several role changes, employees have far more access than their current role requires.
After several role changes, employees accumulate permissions from previous roles that they no longer need. This creates both security risk and audit complexity.
"Remove before add" workflow
Receive notification
HR triggers the process with the role change notification
Identify & revoke
Identify old permissions to remove and revoke them
Grant new access
Grant new permissions based on RBAC model
Re-certification timeline
30-day review
Manager or role owner reviews access to confirm alignment with actual job functions
60-day review
Follow-up review to catch any gaps not visible on day one
HR
Triggers role change notification
IT
Executes permission changes
Hiring Manager
Confirms new access level
Security
Runs 30/60-day re-certification
Ongoing Governance: License management, access reviews, privilege creep
Ongoing governance catches the drift that day-to-day operations misses. The average identity holds approximately 100K permissions, and 27.8% of permissions remain ungoverned. Without regular reviews, you accumulate unused licenses, stale permissions, and shared credentials that haven't been rotated.
License management
Track usage
Total licenses purchased, in use, and available
Monitor costs
Cost per license and forecast for changes
Approval workflow
Who approves new licenses and when
- → Run quarterly for privileged roles, sensitive groups, and external guests
- → Document: is access still needed, does it align with current role, any red flags
- → Retain evidence for auditors
Privilege creep detection
Baseline comparison
Compare current permissions against the RBAC model for the person's role. Flag permissions that exceed the baseline.
Investigate exceptions
Was this approved, is it still needed, should the RBAC model be updated?
Contractor & vendor identity constraints
Offboarding (Leavers): Deprovisioning timeline and data handoff
Offboarding is where most organizations have the largest gaps. More than a third of former employees still had access to company files on personal devices. The gap between "HR notified IT" and "access actually revoked" is where risk accumulates. How long is that delay in your organization? Have you tested it?
Deprovisioning timeline must be explicit. When does access get disabled: end of day on the last day, immediately upon termination, or "when someone remembers"? Best practice is immediate disablement upon termination notification. The process should be: receive termination notice from HR, disable identity account and revoke sessions, disable VPN and remote access, revoke privileged roles, close SaaS accounts including direct logins and API tokens, rotate shared credentials, transfer data ownership, and document completion.
Data retention and legal hold require advance planning. What happens to their mailbox, files, and project folders? Who inherits ownership, and for how long? If there's a legal hold, what data needs to be preserved, and who's responsible for ensuring it isn't deleted? Without a data handoff process, critical business information gets lost, or worse, remains accessible only to someone who no longer works there.
The offboarding checklist should capture evidence at each step. Ticket ID, timestamp, who performed each action, confirmation from each system owner. This isn't paperwork for its own sake. It's the record you need when an auditor asks, "How do you handle departing employees?" or when an incident investigation traces back to an orphaned account.
Testing is essential. Have you actually run through the full offboarding process end-to-end? Does access get revoked as fast as you think it does? Are there SaaS apps IT doesn't know about? Do API tokens survive SSO disablement? The only way to know is to test with a real departure (or a controlled simulation).
Post-departure Risk: Orphaned accounts, dormant accounts, and what survives
Post-departure risk is what happens after offboarding "completes." Orphaned accounts survive when someone disables the main identity but misses app-specific accounts, API tokens, or direct logins. Dormant accounts survive when someone leaves but their account is never disabled. Both create breach paths that attackers actively exploit.
Credential abuse initiates 22% of all breaches (Verizon DBIR 2025). The delay between deactivating a user and them no longer being a risk is your exposure window. If that delay is hours, you're in good shape. If it's days or weeks, you have a problem. Measure your actual delay: time from HR termination notice to last successful authentication. If you can't measure it, you can't improve it.
What happens to their data after departure? Email forwarding rules that auto-forward to personal accounts. Shared drives with their personal folders still accessible. Project management tools where they own critical tasks. GitHub repos where they're the only admin. These data residues create ongoing risk and operational drag. A working post-departure process identifies and remediates these residues within a defined timeframe.
Dormant account detection should run continuously. 38% of all accounts are dormant (Veza 2025). Flag accounts that haven't authenticated in 30, 60, 90 days. Investigate: is this person still employed, is this a service account, should this account be disabled? Without continuous detection, dormant accounts accumulate until an audit forces a painful, rushed cleanup.
The hard question: what happens when offboarding breaks? Who gets paged? What's the escalation path? If someone discovers a former employee still has access, who fixes it, and how fast? Without an incident response path for lifecycle failures, you rely on heroics and luck. With a path, you have a chance of containing the risk before it becomes a breach.
Accountability & Ownership: Answering the hard questions
Identity lifecycle fails when accountability is ambiguous. The hard questions need explicit answers: Who approves permissions? Who creates new users? Do all applications support provisioning, and what's the manual fallback? Who manages and approves license counts? How do we forecast costs? How do we deprovision users, and what do we do with their data? Do we know what happens to their data? Have we tested all of this?
A working accountability model assigns owners to each lifecycle stage. HR owns the trigger (hire/role change/termination notices). IT owns execution (account creation, permission changes, deprovisioning). Department managers own role-based access approvals. Security or compliance owns access reviews and evidence retention. The model should be documented, visible, and reviewed quarterly.
Application provisioning gaps require explicit handling. Not all applications support SCIM or API-based provisioning. For each application, document: does it support automated provisioning, does it support automated deprovisioning, what's the manual process if automation isn't available, who owns that manual process, and what's the SLA for completion? Without this inventory, you assume applications are covered until an audit or incident proves otherwise.
Testing and validation are non-negotiable. Have you tested the full lifecycle end-to-end? Do you know what happens to data after departure? Have you measured the actual delay between deactivation and risk elimination? Without testing, you're operating on assumptions. With testing, you have data to drive improvements.
Common Questions
What is identity lifecycle management?
Identity lifecycle management is the end-to-end process of managing user access from pre-hire planning through onboarding, role changes, ongoing governance, and offboarding. It ensures the right people have the right access at the right time—and that access is removed quickly when no longer needed.
Why is delayed deprovisioning dangerous?
Delayed deprovisioning creates a window where former employees retain access to email, files, SaaS apps, and admin portals. Studies show 38% of all accounts are dormant, and 16.5% of total permissions belong to inactive users. Credential abuse initiates 22% of all breaches, and orphaned accounts are a primary attack vector.
Who should own the identity lifecycle?
Accountability must be explicit. HR owns the trigger (hire/termination notices). IT owns execution (account creation/deletion). Department managers approve role-based access. Security or compliance owns access reviews and evidence retention. Without clear ownership, gaps appear between notification and action.
How do we handle contractor and vendor identities?
Contractor and vendor identities need the same lifecycle discipline as employees, with additional constraints: time-bound expiration dates, scoped permissions (never broad admin access), and explicit renewal processes. Their offboarding should be tied to contract end dates, not ad-hoc requests.
What evidence should we keep for compliance?
Maintain an audit trail of who approved access, when it was granted, when it was reviewed, and when it was removed. Keep offboarding checklist completion records with ticket IDs and timestamps. Run quarterly access reviews for privileged roles and sensitive groups, documenting findings and remediation actions.
How does identity lifecycle connect to device and application lifecycle?
Identity lifecycle is the control plane that triggers device and application actions. When someone joins, identity provisioning should trigger device enrollment and app provisioning. When someone leaves, identity deactivation should trigger device wipe/return workflows and app deprovisioning across all systems, including SaaS apps that exist outside SSO.
Related resources
Sources & References
Need help managing the full identity lifecycle?
We help organizations build repeatable identity processes — from onboarding through offboarding — so access is right-sized, evidence is captured, and departures don't become security incidents.
Contact N2CON