Your identity environment probably has more accounts than you think, and fewer eyes on them than you’d like
Here’s a scenario that plays out more often than most IT teams are comfortable admitting. An employee leaves. Their Active Directory account gets disabled. But the local accounts they had on three internal systems, the shared vendor credential they used for remote access, and the application account tied to their email? Those stay active. Quietly. For months, sometimes years.
This isn’t negligence. It’s the predictable result of managing identities system by system, application by application, without a centralized view of what exists and who has access to what. And according to guidance from the NSA and CISA, it’s one of the most exploitable gaps in enterprise IAM today.
The real problem with local accounts at scale
Local accounts feel manageable when you have a handful of systems. At scale, they become something else entirely. Every platform with its own user base, its own password policies, and its own session rules adds another layer of complexity that no team can reasonably monitor in aggregate.
The NSA and CISA are direct about this: massive volumes of locally provisioned accounts across enterprise systems simply cannot be maintained at a security level that matches the risk they represent. The issues compound quickly. Security event monitoring becomes ineffective because there is no single view of authentication activity.
Shared accounts make forensic attribution nearly impossible after an incident. And attackers who gain a foothold through one locally managed system can use that access to probe others without generating the cross-system alerts that would otherwise flag the behavior.
What identity federation and SSO actually fix
Identity federation and SSO are often framed as user experience improvements. One login across multiple applications. Less friction, fewer passwords to remember. That’s real, but it undersells what these technologies do from a security standpoint.
When authentication is centralized through an SSO solution tied to an identity provider, administrators gain something they don’t have in a fragmented local account environment: a single, authoritative view of who is accessing what, from where, and when.
Anomalous behavior becomes visible because there is a baseline to compare against. Policy enforcement becomes consistent because it happens in one place, not across dozens of independently configured systems.
Federation also enables a critical operational improvement around access lifecycle management. When an employee leaves, disabling the centralized identity disables access everywhere. There’s no checklist of systems to manually update and no overlooked local account still sitting open.
SSO also creates the right foundation for a stronger MFA rollout. Integrating MFA at the centralized authentication layer means you’re securing one system and covering every application it connects to, rather than attempting to configure and maintain MFA across each application independently.
The attack surface shrinks. The monitoring becomes more effective. And the user experience stays manageable.
Where most organizations have gaps
The honest starting point is an inventory question. Most IT teams have a reasonable picture of their primary directory and their major cloud applications. What tends to be less clear is the long tail: legacy systems with local admin accounts, vendor-managed platforms with shared credentials, applications that predate the current IAM architecture and were never brought into federation.
These are the accounts that don’t show up in standard reports and don’t generate alerts when they’re used outside of normal hours or from unexpected locations. They are exactly the kind of accounts that bad actors target because they exist outside centralized visibility.
The remediation path isn’t complicated in principle. It starts with a complete inventory of locally provisioned accounts across all systems. From there, the question is straightforward: which of these can be eliminated by extending SSO to the platform? Which require a local account for operational reasons and therefore need explicit password policies and monitoring? And which are simply legacy accounts that should have been revoked long ago?
The operational case, not just the security case
There’s a resource argument here that’s worth making alongside the security one. Managing multiple identity infrastructures across an organization is expensive. Each system with its own authentication logic represents ongoing configuration work, patch management, and helpdesk load.
Centralized authentication through federation and SSO reduces that overhead significantly and makes it easier to maintain security standards over time without proportionally increasing the team required to manage it.
This is part of why the NSA and CISA position identity federation not as an advanced capability but as a foundational one. Organizations that are still operating primarily on local accounts are not in a position to effectively manage the identity risks that exist in modern hybrid and multi-cloud environments.
Planning to review your IAM environment?
If you’d like to think through where your current IAM environment stands and what improvements would have the most impact, that’s exactly the kind of conversation we have with IT teams every day.
A practical next step
If your organization hasn’t done a full inventory of locally provisioned accounts recently, that’s the right place to start. Not because the result will necessarily be alarming, but because you can’t make good decisions about federation and SSO strategy without knowing what you’re actually working with.
From there, assessing which applications in your environment currently support SSO federation and which don’t is the second step. Most modern platforms do. The gaps are usually legacy systems and vendor-managed applications. Knowing where those gaps are is what makes a realistic remediation roadmap possible.
Sources:
-
Identity and Access Management: Recommended Best Practices for Administrators


