What Infra Teams Overlook: The Hidden Engineering Costs of IAM Workarounds
.jpg)
Executive Summary
Identity governance is often seen as a “security problem,” owned by CISOs and GRC leaders. But in practice, much of the execution lands on infrastructure and platform engineering teams. Because infrastructure teams are not directly accountable for compliance or negligence outcomes, they often lack the incentive to fully resolve potential identity gaps. Instead, they apply quick fixes, IAM “workarounds” that get systems working but create hidden costs in engineering time, operational risk, and audit pain.
This paper examines the overlooked engineering toll of IAM workarounds, the organizational misalignment that drives them, and how Orchid’s application-level discovery and governance infrastructure helps both security and infra teams close the gap.
Introduction: Why IAM Gaps Lead to Engineering Workarounds
Even the most mature financial institutions and global enterprises struggle to align identity governance with the realities of their sprawling, complex IT estates. Despite years of investment in Access Management, PAM and IGA platforms, the execution gap remains wide.
Slow onboarding into an identity tool or stack:
Bringing a new application into central Access Management, PAM and IGA systems is rarely quick. In many cases, onboarding takes months, involving application review, connector development, role mapping, and approval workflows. This lag doesn’t match the pace of modern software delivery, where infrastructure and applications are spun up in hours, not quarters. There is constant pressure to “get it done” as fast as possible.
Divergent priorities between security and infrastructure teams:
CISOs and risk teams are measured on compliance with regulations or frameworks- like SOX, GDPR PCI, NIST CSF, ISO 27001 and similar- where completeness, auditability, and least-privilege access matter most. In contrast, infrastructure and DevOps teams are incentivized to optimize for uptime, comply with SLAs, speed delivery, and manage cost efficiency. Their success is judged by availability dashboards and velocity metrics, not by the completeness of access implementation and certifications.
The collision point:
When compliance-driven security requests meet aggressive delivery timelines and busy teams, friction is inevitable. To avoid delays that could stall product launches or revenue delivery, infra teams often take shortcuts:
Each shortcut accelerates delivery in the short term but creates identity sprawl, unmanaged privileges, and audit blind spots.
The root issue - misaligned ownership:
Infrastructure teams don’t own identity governance outcomes. Their KPIs do not include regulatory compliance or audit performance. Instead, they are accountable for uptime, velocity, and cost control. This misalignment makes “identity debt” a rational choice: short-term workarounds appear less risky to infra teams than missed delivery commitments. Unfortunately, the accumulated identity debt magnifies long-term risks, exposure in audits, failed compliance checks, and expanded attack surfaces.
Key point:
Until organizations address this structural misalignment, identity governance will remain a back-burner concern for infrastructure teams, leading to accumulating shortcuts and continued cycles of debt, remediation, and recurring risk.
The Hidden Costs That Add Up
.png)
Engineering Debt
- Maintaining glue code, brittle scripts, and exception processes consumes valuable engineering cycles.
- Every upgrade or migration re-breaks these integrations, compounding costs.
Operational Drag
- App onboarding to IAM stacks slows down.
- Incident investigations take longer when logs can’t be trusted.
- Engineering time is wasted reconciling access across fragmented systems.
Compliance Risk
- Auditors can’t validate MFA, SoD, or access reviews across unmanaged apps.
- Orphaned accounts persist because there’s no visibility outside IAM.
- Findings increase, remediation timelines lengthen, and costs rise.
Incident Response Gaps
- In unmanaged systems, activity logs don’t distinguish between human users, service accounts, and AI agents.
- Attribution becomes impossible, and response times stretch.
The real cost isn’t just dollars, it’s awareness, visibility, the drag on agility, compliance, and resilience.
Real-World Scenarios
- The Pre-Audit Scramble - Infrastructure teams scramble to script reports and reconcile data from unmanaged apps to satisfy a SOX audit. Hundreds of hours lost.
- The Silent Breach - An orphaned admin account on a legacy server is exploited. The CISO is accountable, but the infrastructure team owned the server and didn’t retire the account.
- The Cloud Migration Trap - A legacy payment app is lifted into AWS with its hardcoded service keys intact, IAM blind spots carried into the cloud.
- Agent AI Blind Spot - Teams adopt AI agents for operations without aligning their authorization with operators, leaving new highly privileged agent-AI roles. Logs show “system did it,” but not which agent, ran by which operator and why.
The Accountability Gap: Why Workarounds Persist
- Security (CISO, GRC) - Accountable for compliance, audit, and risk reduction.
- Infrastructure / Platform Teams - Responsible for keeping systems running, meeting SLAs, but not accountable for identity governance failures.
This misalignment creates a built-in motivation gap: infra teams prioritize delivery, while security teams clean up identity messes later. The result is IAM workarounds that solve today’s delivery problem but worsen tomorrow’s compliance and risk problem.
To close the gap, governance must embed itself into infra workflows automatically, not rely on motivation or manual discipline.
The Orchid Security Approach
.png)
Orchid eliminates the need for IAM workarounds by making identity truth visible where it actually resides, in the application itself.
- Application-Level Discovery - Surfaces identities, accounts, and access models directly from app binaries/configs.
- Continuous Correlation - Matches unmanaged and managed accounts to deliver a single source of truth.
- Prioritization by Risk & Business Impact - Infrastructure and security teams know where to act first.
- Frictionless Onboarding - Cuts months of manual questionnaires and app owner back-and-forth.
- Agent AI Governance - Extends identity rigor to AI-driven operators with attribution and dynamic authorization.
Business Value for Infra & Security Teams
- For Security (CISO, GRC) - A compliance-ready baseline that shrinks dark matter, supports audits, and reduces regulatory exposure.
- For Infrastructure Teams - Less engineering debt, fewer scripts to maintain, and faster onboarding of applications.
- For the Enterprise - Stronger governance at lower cost, with identity becoming an enabler instead of a blocker.
Understanding, let alone maintaining, identity security posture across any large organization- with its diverse and always evolving application estate- is a constant challenge.
Remember, that estate includes applications created by different developers, at different times- when technology, regulations and cyber risk were different- and even by different organizations if acquisitions were part of the growth strategy.
Any approach, but especially an automated one, that provides a comprehensive and accurate view into the true state of identity, is hugely valuable to CISOs. Especially when it can surface all of the identity flows coded in each application. We know that many threat actors are adept at finding the alternate or forgotten ways into our organizations, and this report highlights the most common exposures we need to look out for (and address).
The insights shared here are instructive for every cyber security professional.
- 48%
Storage of hard coded, cleartext credentials or use weak hashing
- 44%
Authentication paths that bypass the corporate Identity Provider
- 40%
A lack of baseline controls like rate limiting, account lockout and password complexity
- 37%
Outdated or non-standard authentication protocols
- 37%
of applications failed to enforce access controls fully or at all
Checklist to Identify the Top Missing Identity Controls
Download Checklist
Discovery and Gap Analysis: Continuous Visibility Beyond the Known
Orchid delivers continuous, telemetry-driven visibility into identity implementations across all automatically discovered applications regardless of geography, technology stack, or existing compliance knowledge. This capability empowers organizations to uncover both commonly missed controls and hidden identity mechanisms that conventional audits and reviews often fail to detect.
No Prior Context or Manual Input Required
Unlike traditional assessment and onboarding processes that rely on interviews, documentation, or involvement from app owners or developers, Orchid's analysis is entirely autonomous. It requires no prior data points, tribal knowledge, or manual onboarding, making it ideal for large, fast-changing environments.
Save Time, Save Money — Harness Your True Identity Landscape
By eliminating the need for human-led discovery, context-gathering, or code walkthroughs, Orchid significantly reduces the time and cost of identity posture management. It accelerates both discovery, gap analysis and remediation cycles including onboarding, freeing up security teams and engineering resources to focus on higher-impact work while utilizing the organizational siloed identity tools.
Checklist, Fully Covered
Our platform aligns directly with the Checklist to Identify the Top Missing Identity Controls and many more providing instant, actionable insights on where your applications stand and what needs attention.
- January 2025
PowerSchool Breach
Cybercriminals reportedly used stolen credentials to access a support portal that lacked MFA, exposing sensitive student and parent data.
- March 2025
Jaguar Land Rover Incident
A threat actor used stolen credentials to infiltrate the company’s Jira system, allegedly stealing over 700 internal documents.
- April 2025
Verizon Data Breach Investigations Report
Verizon Identifies Stolen Credentials as Top Breach Entry Point In their latest report
Quick Checklist
- Scope, baselines and owners.
- Complete application inventory (managed + unmanaged).
- Identity lifecycle records (joiner, mover, leaver).
- Authentication logs (success, failure, session termination).
- Access governance evidence (least privilege, SoD, privilege elevation).
- Overlay risk exposure tracked (orphan, local, shadow, stale accounts).
- Dashboards, reports and evidence prepared for auditor review.

.png)
.png)



