Identity Chronicle – Deep Dive: Making Breakglass Access Secure, Accountable, and Audit-Ready

The Real Problem with Emergency Access

In enterprise environments—especially those that operate 24×7—there are moments when someone needs elevated access immediately. A critical service fails. A major incident occurs. Business continuity is at risk. In these moments, organizations rely on breakglass accounts to bypass normal access controls and restore order.

And that’s perfectly reasonable—until it’s not.

One of our customers, a large enterprise with a complex IT footprint, approached us with the following issue:

“We use breakglass accounts for emergency access, but there’s no approval workflow, no MFA, and no audit trail. Auditors are concerned. And so are we.”

They weren’t alone. Across industries—finance, healthcare, manufacturing—organizations continue to rely on shared, privileged accounts for emergency access that:

  • Can be activated with just a password
  • Aren’t linked to a specific person
  • Can remain active longer than needed
  • Leave no clear trail of who did what and why

 

This makes breakglass access one of the most exploitable blind spots in any access governance program.

This wasn’t a simulated phishing drill.

This wasn’t a penetration test finding.

It was a real login attempt into a bank’s internal application.

A relationship manager’s credentials had been compromised through a targeted phishing email. The attacker didn’t just have the username and password — they also successfully completed the OTP challenge. From the application’s point of view, the authentication looked valid.

The login attempt happened late in the evening, outside normal working hours, from a location the user had never accessed from before.

In many environments, this is exactly where the story turns into an incident.

What the Customer Needed

The customer’s identity and security teams outlined three major goals:

  1. Controlled invocation: Breakglass accounts should only be usable after a defined request and approval process.
  2. Individual accountability: No shared logins. Every use of elevated access must be traceable to a named user.
  3. Audit-ready logging: Every session must be logged, time-bound, and available for attestation during compliance reviews.

At the same time, they didn’t want to slow down emergency access when it was truly needed.

This balance—speed with accountability—is exactly what we helped them achieve.

How BAAR-IGA Solved It

1. Approval-Based Breakglass Workflow
 
We began by configuring a custom breakglass workflow in BAAR-IGA. Instead of a generic shared login, any request for elevated access now begins with a named user initiating a request through the BAAR portal.
The request includes:
 
  • Reason for access (e.g. incident ID, ticket number)
  • Scope of systems or permissions needed
  • Duration of access
 
Once submitted, the workflow can:
  • Route to a manager, application owner, or security lead for approval
  • Allow emergency auto-approval with post-facto review for critical cases
  • Log every step with timestamps for full traceability
 
This means no access happens without intent and visibility.
 
2. MFA + Time-Bound Access Control
Before the session begins, BAAR-IGA enforces multi-factor authentication (MFA) using the BAAR Authenticator app. Even if credentials are known, no one can access breakglass sessions without validating their identity.
Access is also strictly time-bound:
 
  • Entitlements granted are temporary and expire automatically
  • Access revokes immediately after the approved duration or upon session termination
  • This eliminates the risk of dormant high-privilege accounts lingering in the system
 
In effect, every emergency access session is now secure by design—even under pressure.
 
3. Audit-Ready Logging and Traceability
The moment access is granted, BAAR-IGA logs the session:
 
  • Who requested and approved the session
  • Which systems were accessed and when
  • What actions were performed (via integrations with existing logs or optional session recording)
  • Duration and justification
 
All logs are immutable and exportable for audits. Additionally, reviewers can attest to breakglass usage in scheduled or on-demand access certification campaigns.
This ensures that even after the event, nothing is left unexplained.

The Outcome

Here’s what the customer gained:
 
  • No more shared logins — every access session is tied to a named user
  • Real-time approval and strong authentication before elevated access
  • Automatic revocation ensures privileges don’t linger
  • Full visibility of who accessed what, when, and why
  • Audit-ready logs and attestation aligned with internal and external compliance standards
  • All of this was implemented without modifying their underlying systems

This implementation turned what was previously a high-risk, unmanaged process into a governed, accountable, and secure emergency access pathway—all without compromising agility.

Why This Matters

Breakglass accounts are often overlooked during identity governance rollouts. They’re seen as edge cases—“we’ll get to that later.” But these accounts, precisely because they bypass normal controls, are among the most critical to govern.

By integrating breakglass access into BAAR-IGA, organizations gain the best of both worlds:

  • Speed when it matters most
  • Control, auditability, and trust every time

 

Identity governance is not just about regular access. It’s about the exceptions too.

Get our latest Identity Chronicles delivered to your inbox.

Enhanced Trust

Want to transform how you manage identities and controls?

We use cookies to ensure you get the best experience on the BAAR Technologies website, to help us understand our marketing efforts, and to reach potential customers across the web. You can learn more by viewing our privacy policy.