BlogDocumentation
Products
Identity ProtectionIdentity ManagementBlogDocumentation
Vincenzo Iozzo
Vincenzo Iozzo
5 May, 2025
The issues with achieving least privilege The SlashID approach to the problem What about built-in permission analyzers? Results you can expect Conclusion
New Feature
Achieving Least Privilege: Unused Entitlement Removal

Unused entitlements are one of the easiest ways for an attacker to move laterally in a target environment.

However, reducing permissions is often very difficult due to availability concerns and the complexity of the permission systems.

This blog post explores how SlashID solves this problem so that customers can automatically resize identity permissions and

achieve least privilege.

Achieving Least Privilege: Unused Entitlement Removal

Least privilege is a goal that many organizations aim to achieve but rarely do. For example, Microsoft estimates that almost 98% of their tenants have at least one overprivileged identity in their tenants.

At a fundamental level, the presence of unused permissions leads to a key problem for an organization: once an identity is compromised, it becomes much easier for an attacker to move laterally or escalate privileges in an environment.

However removing unused permissions is far from easy, so at SlashID we’ve worked hard to automate the process and help companies achieve a safer posture.

The issues with achieving least privilege

Depending on the organization, several factors get in the way of removing unused entitlements but three are by far the most common:

  1. Concerns over uptime: What if removing an entitlement causes a critical cron job to stop functioning or a key employee can’t do their job when it is most needed?
  2. Complex authorization systems: Authorization systems are increasingly harder to comprehend, especially for CSPs. Creating least privilege policies at provisioning is all but impossible
  3. Birthright creep: Permissions are commonly assigned to users based on their job function. This often means that everyone in a given department gets the same permissions irrespective of whether they need them or not

The SlashID approach to the problem

At SlashID we have combined the power of an identity access graph with real-time streaming of audit logs. This combination allows us to identify unused permissions for each identity and automatically generate a new policy to remove them.

We do this for all supported environments, not just CSPs.

Here’s an example showing how to generate a policy that removes unused permissions for an AWS identity:



What about built-in permission analyzers?

GCP and AWS provide built-in permissions analyzers that can help identify unused permissions and build least privilege policies; however, they suffer from several shortcomings:

  1. The lookback window is limited to 90 days: if you want to preserve permissions used by an identity sporadically, you can’t leverage the built-in access analyzers
  2. They are not automated: if you want automated remediation, you need to build a workflow pipeline yourself
  3. They don’t take into account all events leading to potentially incorrect remediations
  4. They don’t take into account impersonation: Often roles and service accounts are used by multiple identities so the role itself might require all permissions assigned to it but the identities that can impersonate that role don’t need to. The built-in analyzers don’t see that
  5. They always create new policies from scratch instead of recommending existing ones that could fit the identity
  6. Often the cost of generating new policies skyrockets, making this an exercise that can only be done rarely rather than continuously

With SlashID, those problems are automatically addressed for you so you can safely remove unused permissions without manual effort or downtime.

Results you can expect

  1. 50‑90 % reduction in standing privileges within the first month
  2. Zero unplanned downtime
  3. 10-30% Saving from unused seats or licenses

Conclusion

Removing unused permissions is one of the best hygiene measures companies can take to prevent an incident from turning into a breach. Please get in touch to learn more.

Related articles

Detecting Man-in-the-Middle Attacks with SlashID

New Feature

/ 26 Aug, 2024

Detecting Man-in-the-Middle Attacks with SlashID

Detect when attackers access your website through malicious proxies with SlashID.

Ivan Kovic
Ivan Kovic
SlashID RBAC: Globally-available role-based access control

New Feature

/ 22 Jul, 2024

SlashID RBAC: Globally-available role-based access control

SlashID RBAC is a globally replicated role-based access control system that allows you to restrict access to resources based on permissions assigned to specific persons.

In this post, we will show you how to use RBAC in SlashID, and how to create permissions, and roles, and assign them to persons.

Robert Laszczak
Robert Laszczak
Introducing the SlashID Local Deployment

New Feature

/ 24 Jun, 2024

Introducing the SlashID Local Deployment

The SlashID local deployment is our answer for developers looking to build, run and test apps locally.

Local development with SlashID can be a good fit for your evaluation, prototyping, development, and continuous integration workflows.

Vincenzo Iozzo, Giovanni Gola
Vincenzo Iozzo, Giovanni Gola
Vincenzo Iozzo, Giovanni Gola

Ready to start a top-tier security upgrade?

Terms · Privacy · System Status
© 2025 SlashID® Inc. All Rights Reserved.

Products

Identity Protection Identity Management

Resources

Blog Get in touch

We use cookies to improve your experience. Read our cookie policy.