Decommissioning is the process of retiring, deactivating, or shutting down IT systems, applications, service accounts, or identities that are no longer needed — ensuring associated access is fully revoked and credentials are invalidated.
⚙️ How Does It Work?
IGA platforms track system and account lifecycles. When a system is decommissioned, the IGA workflow automatically disables associated accounts, revokes entitlements, rotates or invalidates credentials, and generates audit records.
📍 Where Is It Used?
Enterprise IT environments managing application portfolios, cloud workloads, and the large inventory of service accounts and NHIs that accumulate over time.
💡 Real-World Example
A company decommissions a legacy CRM system but forgets to disable its 12 service accounts. Two years later, a penetration tester discovers the accounts still have active credentials with database admin access — a critical orphaned account risk.
🔗 Related Terms
Stay Ahead in Identity Security
Get weekly IAM, PAM & IGA insights via Identity Pulse.
Subscribe to Identity Pulse →