Your Q1 access review just completed. You reviewed 1,000 employees across 100 applications. Everything passed. Auditors are satisfied.
Then you get the call from Security:
"We detected unusual data exports from your production database. Someone with admin access downloaded customer records. Do you know who has database admin privileges and why?"
You open your access review results. Database administrators were reviewed and approved—all 47 of them. Wait, 47? Your database team has 5 people. Who are the other 42?
This is why standard access reviews aren't enough for privileged access. Your quarterly review asked "Does each person need access to the database?" but didn't ask "Does each person need admin access to the database?" The first question caught zero violations. The second would have caught 42.
Think about your last access review. You reviewed 1,000 employees across 100 applications. Now count how many have admin access—the power to modify systems, change configurations, bypass permissions.
Probably 20-50 people. Maybe 2-5% of your workforce.
Now think about your security incidents from the past year. Most involved someone with elevated access doing something they shouldn't.
We've analyzed access patterns across hundreds of organizations, and the pattern is consistent: A tiny fraction of users hold a disproportionate amount of risk.
Yet most organizations review admin accounts with the same cadence and rigor as standard user access. Same quarterly cycle, same approval workflow, same rubber-stamp mentality.
You don't need a massive budget or enterprise-grade security team to fix this. Privileged access needs different treatment—more frequent reviews, deeper scrutiny, multi-level approval, and usage monitoring.
In this guide, we show you how to implement privileged user access reviews that actually reduce your highest-concentration risk, starting in 4 weeks.
What Qualifies as Privileged Access
Before you can review privileged access differently, you need to define it clearly.
Privileged access is any access that enables users to:
- Change system configurations or settings
- Add, remove, or modify other users' access
- Access data regardless of permissions (bypass access controls)
- Execute commands at system level (admin, superuser, root users)
- Modify or delete audit logs
- Access production environments directly
- Make changes that affect multiple users or systems
Common privileged access types:
Administrative accounts: Local admin on workstations, domain admin in Active Directory, organization admin in SaaS platforms (Okta, Google Workspace, Office 365), application admin in business systems (Salesforce, NetSuite, Workday).
Developer access: Production environment access, CI/CD pipeline admin (can deploy code to production), Source code repository admin (GitHub, GitLab, Bitbucket), API keys and service accounts with elevated permissions.
Data access: Access to customer PII regardless of role, Financial system access (ERP, general ledger, banking), Healthcare data (EMR, patient records), Access to encryption keys or secrets management.
Infrastructure access: Cloud platform admins (AWS, Azure, GCP), Database admins (read/write to all databases), Kubernetes cluster admin.
Security tools: SIEM admin (can modify alerts or logs), Endpoint protection admin (can disable security controls), Identity provider admin (can change authentication rules), Backup system admin (can restore or delete backups).
The key distinction is that while standard users can only access data they're explicitly granted, privileged users can access data beyond their role or modify systems that affect others.
Create an inventory of all privileged access in your environment. Start with the obvious—domain admins, root accounts, application admins—then expand to the less obvious: developers with production access, analysts with unrestricted data access.
Partner with Security to define your organization's privileged access criteria. What requires elevated review and approval beyond standard access? This definition drives everything that follows.
Why Privileged Access Needs Different Treatment
Standard access reviews don't assume anything about risk. Privileged access reviews assume high-risk.
Compromised Privileged Accounts Cause Exponentially More Damage
A standard user with Salesforce access can view and edit records they're assigned. A Salesforce admin can export the entire customer database, modify permissions for all users, delete historical data, integrate with external systems, and access records regardless of sharing rules.
A standard AWS user can launch EC2 instances within quota limits. An AWS admin can terminate all production infrastructure, modify security groups to allow public access, delete backups, access S3 buckets containing sensitive data, and create new admin accounts.
One compromised privileged account can do more damage than 100 compromised standard accounts.
Privileged Accounts Are Prime Breach Targets
Attackers don't want to compromise random employee accounts—they want admin accounts that let them move laterally, escalate privileges, disable security controls, and exfiltrate data without triggering alerts.
Watch how breaches actually happen. An attacker compromises a standard account through phishing. They explore the network. They find an unmonitored admin credential—maybe shared among a team, maybe dormant from someone who left 8 months ago. They escalate. Now they have the keys to everything.
The pattern repeats because privileged accounts are both rare and powerful.
Privileged Access Drifts Faster and Creates Bigger Vulnerabilities
Engineers get promoted to management but keep their old admin access. Emergency access gets granted during incidents and never revoked. Projects require temporary elevated access that becomes permanent. Contractors finish their work but admin access stays active.
Standard access drift creates inefficiency—users with access to tools they don't use. Privileged access drift creates security vulnerabilities—users with power they shouldn't have. The difference matters when you're deciding how often to review and how rigorously to scrutinize each account.
Compliance Frameworks Explicitly Require Heightened Controls
Most compliance frameworks explicitly call out privileged access for special treatment. SOX requires separate review of privileged access to financial systems. PCI DSS mandates quarterly review of administrative access. ISO 27001 requires heightened controls for privileged access. SOC 2 requires additional monitoring and approval for admin accounts.
Treating privileged access the same as standard access won't satisfy auditors. They expect to see documented evidence that elevated access receives elevated scrutiny.
The Multi-Level Privileged Access Review Process
Traditional access review: Manager reviews, approves or revokes, done.
But single-level approval misses critical violations—we've seen it repeatedly. Multiple checkpoints catch what one level misses.
Here's how the process works.
Phase 1: Discovery and Classification
Discover all privileged accounts:
Don't assume you know where all the admin accounts are. We've worked with organizations that discovered up to 200% more privileged accounts than they expected when they ran comprehensive discovery for the first time.
Most organizations limit discovery to centrally managed systems—they query Active Directory for domain admins, export admin users from their SSO platform, and call it complete.
Meanwhile, privileged access exists everywhere else. That developer with production database credentials isn't in your IDP admin group. That contractor with AWS root access isn't in Active Directory. The analyst with unrestricted data export permissions isn't flagged anywhere.
We've learned that comprehensive discovery requires multiple methods: Query Active Directory for domain admins and elevated groups, export admin users from every SaaS application, identify users with production environment access, find database accounts with superuser privileges, inventory service accounts with elevated permissions, and check cloud platforms (AWS, Azure, GCP) for admin-level IAM roles.
Traditional discovery methods miss privileged access that exists outside central systems. Comprehensive discovery reveals privileged access across your entire environment, not just centrally managed systems.
Classify by risk level:
Not all privileged access carries equal risk. You need to tier it appropriately.
Critical (Crown Jewels): Production database admin, AWS/Azure/GCP organization admin, domain admin, financial system admin (ERP, banking), customer data access (can export all PII), security tool admin (can disable controls or modify logs).
High: Application admin for business-critical systems, Kubernetes cluster admin, backup system admin, CI/CD pipeline admin (can deploy code), source code repository admin, SIEM or log management admin.
Medium: Non-production environment admin, department-level admin (can manage their team only), application admin for low-risk systems, read-only access to sensitive data (can view but not modify).
Critical privileged access requires CISO approval (or whoever takes the security decisions at your company). High privileged access requires Security team approval. Medium privileged access requires application owner approval. This tiered approach focuses attention on highest-risk access without creating bottlenecks on lower-risk privileges.
Document justification and usage:
For each privileged account, capture: who has the access (name, role, department), what system or application the privilege is for, what privilege level (admin, superuser, owner), business justification (why they need elevated access), when the access was granted, when it was last used (last login, last action), expected expiration date (if temporary access).
We built Zluri to automatically extract these usage patterns: Active usage (logged in within 30 days), Dormant usage (no login 30-90 days), Inactive usage (no login 90+ days), Never used (access granted but never utilized).
This intelligence surfaces which privileged accounts actually need review versus which can be auto-flagged for revocation. You're not guessing which admin accounts are dormant—you're seeing exactly when each privileged credential was last used and what actions were performed.
Many privileged accounts are shared, for example, admin@database. Create a policy requiring all privileged access to be tied to named individuals. Shared accounts should only exist for genuine break-glass scenarios with strict usage monitoring. Without individual accountability, you can't know who did what when something goes wrong.
Phase 2: Multi-Level Review Workflow
In traditional access review, one reviewer makes a decision. But different stakeholders see different risks—and you need all perspectives to make informed decisions about privileged access.
Level 1: Direct Manager Review
The employee's direct manager is the first checkpoint. They validate: Is this person still in the role that requires privileged access? Has their responsibility changed? Does their current job function still justify elevated permissions? Are they planning to leave or transfer soon?
Managers catch life-cycle changes that haven't been reflected in access. The engineer who transferred from infrastructure to application development 3 months ago still has server admin access. The manager knows they don't need it anymore—IT and Security don't have that visibility.
Managers also flag concerning behavior patterns. If an employee has been written up for policy violations or is on a performance improvement plan, that's relevant context for whether they should retain privileged access.
Manager review alone isn't sufficient—managers often don't understand what "database admin" means technically—but it's a necessary first filter.
Level 2: Application/System Owner Review
The person responsible for each system reviews privileged access to that system. For databases, the DBA team leads reviews who have admin access. For AWS, the infrastructure team leads reviews who have organization admin. For Salesforce, the sales operations lead reviews who has application admin.
This catches what managers miss. A manager approves "database access" without understanding what that means technically. The DBA team lead knows the difference: Read-only analyst access is sufficient for most users. Database admin access—the ability to modify schemas, delete tables, export everything—should only go to the five people who actually administer databases.
System owners validate: Is this the minimum number of people who need elevated access? Could this person accomplish their job with lower-level permissions? Is usage pattern consistent with justified need?
System owners have technical context managers lack. They can identify over-provisioned access and recommend downgrades.
Level 3: Security Team Review
Security reviews all privileged access from a risk perspective.
They validate: Does usage pattern match business justification (if granted for one-time project but used continuously, investigate)? Are there anomalies (unusual login times, bulk downloads, access from unusual locations)? Has this person been involved in security incidents? Does this access require additional controls (monitoring, time-bound expiration)?
Security doesn't make business decisions—they don't know if the marketing manager needs Salesforce admin. But they provide risk context. If that marketing manager has had 3 phishing attempts in the past 90 days, Security flags that admin access might need additional protection like hardware MFA or session recording.
We've seen Security catch patterns that individual system owners miss. A user might legitimately need admin access to System A, and legitimately need admin access to System B, but having admin access to both creates a segregation of duties violation. Security identifies these patterns across the entire environment.
Level 4: CISO/Security leader Review (for Crown Jewels)
For the most critical privileged access—production database admin, cloud platform organization admin, financial system and CRM admin—the CISO or security leadership personally reviews and approves continuation. If you don't have a dedicated CISO, the IT Director or VP of Engineering can fill this role.
This isn't micromanagement. It's acknowledging that certain privileged accounts, if compromised, could cause catastrophic damage. Executive review ensures: Executive awareness of who holds highest-risk access, formal risk acceptance for continued privileged access, opportunity to mandate additional controls (session recording, approval workflows, time-bound access).
This review level should only apply to 5-15 individuals with crown jewel access. If you're sending 100 privileged accounts for executive review, you've classified too broadly.
Multi-level doesn't mean sequential bottlenecks. Use parallel review where possible—manager and system owner can review simultaneously. Only escalate to Security and CISO if lower levels flag concerns. Most privileged access should be resolved at Levels 1-2. Security and CISO only review flagged items plus crown jewel access. Partner with each review level to define clear approval criteria so reviewers know when to escalate versus approve.
Phase 3: Remediation and Monitoring
Unlike standard access, privileged access remediation requires extra care. You can't just revoke database admin for 20 people and hope nothing breaks.
Revocation execution:
Before revoking privileged access, validate: Will this break production systems or automated workflows? Are there service accounts or integrations depending on this access? Does anyone else have backup access to perform critical functions? If this is the only person with admin access, who will handle emergencies?
For service accounts and automation: Identify all uses of the privileged credential, create new least-privilege credentials for specific functions, migrate automation to new credentials, revoke the over-privileged credential only after migration is complete.
Downgrade execution:
Often the right answer isn't full revocation but privilege reduction. Database admin downgraded to read-only analyst access. Application owner downgraded to application editor. Full AWS admin downgraded to specific service admin (EC2 admin, not organization admin).
Downgrades maintain productivity while reducing risk. The user can still do their job, just without the nuclear option of system-wide changes.
Most IGA tools can't automate privilege downgrades. You have to manually log into each application, find the user, change their role, document it, repeat. They handle user creation and deletion (just like SCIM) but can't modify permission levels within applications. The process takes days of manual work across dozens of systems.
This is where Zluri differs from other IGA platforms. When a reviewer downgrades privileged access—database admin to read-only, finance system admin to normal user—Zluri executes the change across applications automatically. What takes 18 days of manual work with traditional IGA tools happens in 24 hours with Zluri, with a complete audit trail.
Continued privileged access:
If privileged access is justified and continues, don't just click "approved" and move on. Implement additional controls via your IAM and IGA provider. Via IAM: Enforce MFA (preferably hardware token, not SMS), enable session recording for audit trail. Via IGA: Set time-bound expiration (re-review in 30-90 days instead of waiting for next quarterly cycle), implement approval workflows (require second person approval for high-risk actions), enable real-time alerting (notify Security of unusual privileged account activity).
Privileged access shouldn't be "review and forget." It should be "review, approve with controls, and monitor continuously."
Create a privileged access registry that tracks all elevated permissions, justifications, expiration dates, and additional controls applied. Review this registry monthly, not just quarterly. Automate alerts when privileged access hasn't been used in 60 days—dormant admin accounts are prime breach targets. Partner with Security to implement continuous monitoring for all privileged activity, not just periodic reviews.
Five Common Privileged Access Issues
We've analyzed privileged access patterns across hundreds of organizations. Here are the issues you'll discover in your own privileged access reviews and how to address them.
Issue 1: Temporary Access That Became Permanent
DevOps engineer needs database admin access for a 2-week migration project. Access granted with business justification: "temporary for Project Phoenix migration." The project completes in March 2024. It's now November 2025. They still have database admin.
We see this in roughly 80% of the organizations we work with.
IT grants access but doesn't set expiration dates. Nobody follows up after projects are complete. The engineer doesn't think to request removal—they have the access, might need it someday, why give it up?
How to catch it: Tag all privileged access grants with expiration date and business justification. Auto-flag any privileged access older than 180 days for mandatory revalidation. For project-based access, integrate with project management tools—when the project closes, trigger automatic access review.
How to prevent it: Implement time-bound privileged access as default. All temporary elevated access auto-expires unless explicitly extended with new justification. Use just-in-time (JIT) access where possible—users request admin access for specific time window (4 hours, 1 day), access auto-revokes when window expires.
Issue 2: Privilege Creep When Roles Change
Sarah started as a DevOps engineer with production server access. She was promoted to engineering manager 18 months ago. She manages a team of 8 engineers, attends leadership meetings, reviews code, handles performance reviews. She also still has root access to production servers.
Nobody with the title "Engineering Manager" should have root production access. But Sarah does because her old access was never removed when her role changed.
HR systems update job titles and reporting structures. Access systems don't. Nobody automatically reviews access when employees change roles. Managers don't think about access when promoting people. The promoted employee doesn't volunteer to give up access—they might "need it for troubleshooting."
How to catch it: Compare current job title/role to privileged access profile. Create baselines: "Infrastructure Engineers have server access. Engineering Managers don't." Flag users whose access doesn't match their current role. Review all access whenever someone's title or department changes in HRMS.
How to prevent it: Integrate access reviews with role change workflows. When HRMS updates someone's role, automatically trigger access review within 5 business days. Implement role-based access control (RBAC) where access is tied to role—when role changes, access automatically adjusts.
Issue 3: Emergency Access That Never Gets Revoked
Production outage at 2am on Saturday. Database is down. The on-call engineer doesn't have sufficient access to fix it. IT grants emergency database admin access to three engineers to resolve the critical issue. By 4am, the database is restored. Service is recovered. Nobody revokes the emergency access. It's now permanent.
Emergencies prioritize speed over process. Access gets granted through unofficial channels—shared credentials, direct permission changes. But once a crisis passes, nobody remembers to clean up emergency access. Engineers assume someone else will handle revocation.
How to catch it: Implement break-glass account monitoring. All emergency access grants should be logged and flagged for automatic review within 24 hours. Any privileged access granted outside normal hours (nights, weekends) should trigger Security alert for post-incident review.
How to prevent it: Use true break-glass accounts—credentials stored in secure vault, require two-person approval to access, automatically expire after a fixed time window (24-72 hours), generate alerts to Security when accessed, trigger mandatory incident report and access review.
Don't grant permanent privileged access during emergencies. Grant temporary time-bound access that auto-expires, requiring explicit extension requests if longer access is truly needed.
Issue 4: Contractors with Lingering Admin Access
Your organization hired a consulting firm to implement Salesforce in 2023. Consultants needed admin access during implementation. Project completed in March 2024. It's now November 2025. Three consultants still have Salesforce admin access. Two of them no longer work at the consulting firm. One works for a competitor now.
This scenario appears in almost every large organization we've audited.
Contractor access isn't tied to contract end dates. When contracts complete, finance stops paying but IT doesn't revoke access. Contractor badge access expires but digital access continues. Nobody tracks when consultants change employers or leave the vendor company.
How to catch it: Maintain contractor registry with contract end dates. Cross-reference privileged access against active contracts—anyone with admin access whose contract ended should be flagged immediately. Review all vendor/contractor privileged access monthly, not quarterly. Verify that vendor employees with access still work for that vendor.
How to prevent it: Tie all contractor privileged access to contract end dates with automatic expiration. Require contractors to request access extension 30 days before contract expires with business justification. Implement stronger offboarding for contractors than for employees—contractors should lose access the same day as contract end, not "eventually."
Issue 5: Shared Accounts with No Individual Accountability
Your database team uses a shared account: "dbadmin@company." Eight people know the password. Last week, someone deleted a production table. You need to know who. You can't tell—the shared account was used, but logs don't show which human was behind it.
Legacy systems that don't support individual authentication create this problem. So does convenience—easier to share one admin account than manage individual privileges. And tradition—"we've always done it this way."
How to catch it: Inventory all shared privileged accounts (common ones: admin@, root@, service accounts, break-glass accounts). For each shared account, identify who has the credentials. Document business justification for why individual accounts can't be used instead.
How to prevent it: Eliminate shared privileged accounts wherever possible. Modern systems support individual authentication—use it. For systems that truly require shared credentials, implement privileged access management (PAM) tools that require individual authentication before granting temporary access to shared credentials, log which individual accessed the shared account, record session activity for audit trail, and rotate shared credentials frequently.
Shared privileged accounts should only exist for genuine break-glass scenarios where individual authentication isn't technically possible, not as default practice.
Track these five issue patterns across your privileged access reviews. If you find the same issues repeatedly, you're detecting symptoms without fixing root causes. Implement preventive controls—time-bound access, role change workflows, contractor expiration policies, PAM tools—so quarterly access reviews validate that prevention is working, not repeatedly clean up the same recurring violations.
How Often to Review Privileged Access
Traditional organizations review all access quarterly. We've realised that privileged access requires different cadences based on risk level. Start with your critical systems, then expand as resources allow.
Critical privileged access (crown jewels): Monthly
Production database admins, cloud platform organization admins, financial system admins, customer data export privileges. These need monthly review at minimum. If you can implement continuous monitoring that alerts Security to unusual activity in real-time, even better—but monthly manual review is the baseline.
High privileged access: Quarterly
Application admins for business-critical systems, infrastructure admins, developer production access, security tool admins. Standard quarterly cadence works here.
Medium privileged access: Quarterly
Non-production environment admins, department-level admins, application admins for lower-risk systems. Standard quarterly cadence is appropriate.
For mid-market teams with limited resources: Focus your effort on critical privileged access first. Monthly reviews of 5-15 crown jewel accounts is manageable. Don't try to implement monthly reviews across everything—you'll burn out your team and the program will fail.
Event-triggered reviews:
Beyond scheduled reviews, certain events should trigger immediate privileged access review: Employee termination, role change or transfer, security incident involving the account, prolonged unusual activity (bulk exports, off-hours access), access granted as "temporary" reaching 90 days, contractor or vendor contract ending.
Organizations with mature privileged access programs often move from periodic reviews to continuous governance—real-time monitoring flags violations immediately, automated workflows handle routine changes, and reviews validate that automation is working correctly.
Proving the Value of Privileged Access Reviews
Leadership may question why privileged access needs different treatment. Here's how to demonstrate value, using real numbers from mid-market companies we've worked with.
Before dedicated privileged reviews:
- 47 people had production database admin (5 justified, 42 unnecessary)
- 23 dormant admin accounts (no login in 90+ days)
- 15 contractors with admin access to systems they no longer work on
- Average 18 days to remediate privileged access violations
- Zero visibility into privileged account usage patterns
After 4 weeks of focused privileged access reviews:
- 5 people have production database admin (only those who need it)
- 0 dormant admin accounts (auto-flagged and revoked within 30 days)
- 0 contractors with lingering access (time-bound expiration enforced)
- Average 24 hours to remediate privileged access violations
- Real-time monitoring of all privileged account activity
Your privileged accounts probably represent 2-5% of total access. But watch where your security incidents actually happen. Most involve someone with elevated permissions doing something they shouldn't. Reducing unnecessary privileged access by 89% (from 47 to 5 in the database example) dramatically shrinks your attack surface. It's not about reviewing more—it's about reviewing what matters.
Auditors specifically test privileged access controls. SOX auditors verify who has admin access to financial systems. PCI auditors verify quarterly review of administrative access. ISO auditors verify heightened controls for privileged users. Strong privileged access review programs directly reduce audit findings.
Cleaning up excessive privileged access improves operational security. Incident response is faster when you know exactly who has admin access. Change management is clearer when only appropriate people can make system changes. Accountability is stronger when every privileged action ties to a specific individual.
Getting Started with Privileged Access Reviews
If you're currently reviewing privileged access the same as standard access, here's your path forward. We designed this timeline for mid-market IT teams with limited budgets and tight deadlines—focus on your highest-risk systems first, then expand gradually.
Week 1: Discover and Classify Critical Systems
Run comprehensive discovery across your environment. Focus immediately on critical privileged access—production database admins, cloud platform organization admins, domain admins, financial system admins. These represent your highest concentration of risk.
We typically find organizations discover at least 40% more privileged accounts (and up to 200%) than they expected in this phase. Don't try to inventory everything at once. Start with crown jewels. Medium and low-risk systems come later.
Classify what you find into three tiers: Critical (needs CISO approval), High (needs Security approval), Medium (needs system owner approval). This classification drives everything else.
Week 2: Document and Assign Reviewers
For each critical privileged account, document: who has it, what system, business justification, last usage date, expected expiration. Assign multi-level reviewers—manager, system owner, Security, CISO for critical access.
Set up parallel review workflows so manager and system owner can review simultaneously. Don't create sequential bottlenecks that slow everything down.
Weeks 3-4: Run Your First Multi-Level Review
Execute the multi-level review process for critical privileged access only. Test the workflow with real accounts. Identify which accounts are justified, which need downgrade, which need revocation.
This pilot catches the biggest risks first—the 47 database admins when you only need 5, the contractors with lingering admin access, the dormant accounts nobody's used in months.
Weeks 5-6: Remediate and Implement Controls
Execute revocations and downgrades carefully. For accounts that continue, implement additional controls: time-bound expiration and usage alerts.
Create a privileged access registry for your critical systems. Set monthly review cadence for these crown jewels.
After Week 6: Expand Gradually
You now have mature privileged access governance for your highest-risk systems. Expand to high-risk systems over the next quarter—application admins, infrastructure admins, developer production access.
Medium and low-risk privileged access can follow standard quarterly review cycles.
The goal isn't perfection across everything simultaneously. The goal is dramatically reducing risk where it's most concentrated, fast.
Six Weeks Later
You get another call from Security: "We detected unusual database activity. Can you tell me who has admin access and why?"
This time you answer in 30 seconds. Five people. Here are their names, roles, business justifications, last login dates, and the additional controls protecting their access. All five are supposed to have it.
The call ends. Security thanks you. No incident report. No emergency meeting. No weekend spent investigating.
That's what changes when you review privileged access differently.
Get Started
See multi-level privileged access review workflows → Book a Demo



.png)













