The Ultimate Guide to Non-Human Identities Report
NHI Forum

Notifications
Clear all

The Orphaned Admin Account That Refused to Die 🕵️‍♀️


(@b-sameer2)
Active Member
Joined: 1 month ago
Posts: 3
Topic starter  

The Orphaned Admin Account That Refused to Die" 🕵️‍♀️

This case came to light during a routine review after a merger between two mid-sized enterprises — each operating with its own IAM framework, legacy HR platforms, and separate Active Directory structures. As part of the initial integration phase, a service account — svc_hrlegacyadmin — was created to support data exchange between the old HR system and a newly established enterprise data hub.

The intention was for it to be temporary. It was granted Domain Admin privileges to streamline troubleshooting during the test phase. But due to delays, shifting priorities, and incomplete documentation, the account quietly slipped through the cracks.

🔍 Where things went wrong:

  • The account was created manually by a developer with direct permissions — outside of any automated provisioning flow or change ticket.

  • Ownership was never assigned in HRIS or in Active Directory, so it didn’t appear in ownership reports or lifecycle certification processes.

  • Metadata classification tagged it incorrectly as a non-privileged technical account, which excluded it from regular review cycles.

  • It was not enrolled in MFA or rotated through a password vault.

  • A legacy Windows 2012 R2 server was still calling the account through a scheduled task script— even after the developer left and the application had been largely deprecated.

📅 Roughly six months after the merger, a Red Team simulation triggered alerts for unusual lateral movement across tiered systems. While there was no actual compromise, further investigation uncovered the svc_hrlegacyadmin account still had elevated rights, was active in multiple systems, and was never certified post-merger.

It had continued operating for over 18 months beyond its intended life span. No one noticed because, in effect, no one was responsible for it.

💡 Takeaways from this incident:

  • Non-Human Identities (NHIs) must be integrated into ILM with the same scrutiny as workforce identities — especially in cross-domain environments.

  • Every identity should have a designated owner, assigned at creation, and reviewed during every access recertification cycle.

  • Privileged accounts — even “temporary” ones — must go through PAM onboarding and be logged, vaulted, and monitored.

  • During major transitions (like M&A or cloud migration), legacy assumptions can create major security blind spots if controls aren't enforced consistently.

🔐 Lesson Learned: Just because an account isn't visible in daily operations doesn’t mean it's harmless. The absence of ownership and governance allowed a high-risk identity to persist far too long — and it took a simulation, not real-time monitoring, to finally flag it.

This topic was modified 5 days ago 2 times by Mr NHI

   
Mr NHI reacted
Quote
(@lalit)
Member Admin
Joined: 2 months ago
Posts: 25
 

Amazing and scary story Sameer, up there with my 3 weeks to cycle one NHI account story.

Lack of ownership, misclassified as a non-admin account, not reviewed.

These examples arw unfortunately very common and why NHIs need manor focus with organisations and a lot of effort to get under control from a full lifecycle standpoint 


   
ReplyQuote
(@b-sameer2)
Active Member
Joined: 1 month ago
Posts: 3
Topic starter  

@lalit

Absolutely agree — these cases highlight just how easily NHIs can slip through the cracks when lifecycle governance isn't airtight. 🧩

What makes it even trickier is that many NHIs are spun up quickly for short-term use but end up becoming long-term blind spots — outside IGA workflows, misclassified, and often lacking ownership or oversight. Without proper joiner-mover-leaver processes, recertifications, and PAM controls, they quietly accumulate risk.

It’s time we stop treating NHI governance as an afterthought and start giving it the same strategic attention as human identity management — if not more. 🔐

#IdentityLifecycle #NHI #IGA #PrivilegedAccess #CyberRisk #IdentityGovernance #IAM #ZeroTrust


   
ReplyQuote
Share: