Decommissioning

Decommissioning is the process of retiring, deactivating, or shutting down IT systems, applications, service accounts, or identities that are no longer needed — ensuring associated access is fully revoked and credentials are invalidated.

⚙️ How Does It Work?

IGA platforms track system and account lifecycles. When a system is decommissioned, the IGA workflow automatically disables associated accounts, revokes entitlements, rotates or invalidates credentials, and generates audit records.

📍 Where Is It Used?

Enterprise IT environments managing application portfolios, cloud workloads, and the large inventory of service accounts and NHIs that accumulate over time.

💡 Real-World Example

A company decommissions a legacy CRM system but forgets to disable its 12 service accounts. Two years later, a penetration tester discovers the accounts still have active credentials with database admin access — a critical orphaned account risk.

🔗 Related Terms

Stay Ahead in Identity Security

Get weekly IAM, PAM & IGA insights via Identity Pulse.

Subscribe to Identity Pulse →
Scroll to top