Home / Companies / Veza / Blog / Post Details
Content Deep Dive

A field guide to bad permissions part 2: expired permissions

Blog post from Veza

Post Details
Company
Date Published
Author
Kale Bogdanovs
Word Count
1,219
Language
English
Hacker News Points
-
Summary

The increasing scale and complexity of identity security due to cloud migration has led to the need for new approaches to manage risky permissions. Expired permissions are one such issue that arises when necessary permissions granted to employees or service accounts are not revoked after their purpose is fulfilled. This can happen because IAM teams prioritize urgent work over removing access no longer needed, and it's difficult to recognize expired permissions without full context. To fix this problem, organizations need to create a culture of access removal and continuously monitor for bad permissions using tools like Veza's Authorization Graph.