Listen on Spotify

Did we just get locked out again?

Cold open

The admin tries to sign in. Then tries again. Then asks whether anyone else is seeing the same error. Within minutes, multiple privileged users are locked out, the helpdesk queue is waking up, and someone asks the question that should have been settled long ago: "Do we still have emergency access?"

No one answers quickly, which is usually the answer.

HR-Z0 case note: when access breaks twice, identity is unmanaged infrastructure.

The horror

Lockout incidents are ugly because they convert identity weakness directly into downtime:

Symptoms

The symptoms are always recognizable:

  • admins cannot access critical settings
  • normal recovery steps depend on the very accounts now unavailable
  • teams improvise escalation paths
  • support and operations stall while access is restored
  • stress exposes how little the recovery model was rehearsed

The event is disruptive. The realization underneath it is worse: the business may not actually know how to recover control of its own environment under identity failure.

Cost

The cost is not abstract.

  • Time: senior staff lose days to access cleanup, lockouts, and incident retros that should have been prevented by baseline controls.
  • Money: emergency response, audit remediation, and avoidable downtime are the most expensive way to run security.
  • Trust: once access looks random, leadership assumes every control is optional, including the important ones.

The root cause

The lockout or over-permission event is the symptom. Exception culture is the disease.

1

Break-glass design is weak or nonexistent

Organizations often assume emergency access exists without maintaining it as a living control.

2

Identity boundaries are not thought through

If too many administrative actions depend on the same fragile identity path, one issue can block the whole response.

3

Recovery is undocumented

Even when emergency options exist, teams may not know where they are, who owns them, or how to use them safely.

4

Exceptions became policy through operational inertia

Even when emergency options exist, teams may not know where they are, who owns them, or how to use them safely.

The fix

The fix is not a security memo. The fix is enforced baseline behavior that survives turnover.

1

NorthStar maps identity failure risk

NorthStar identifies which accounts, roles, and recovery paths the business depends on when normal access fails.

2

Oort strengthens administrative resilience

Oort improves:

  • break-glass account design
  • identity boundary clarity
  • recovery runbooks
  • ownership for emergency access readiness

This does not make lockouts pleasant. It makes them survivable.

3

Oort turns baseline controls into continuous operations

We automate access reviews, exception expiry, backup/restore verification, and sharing enforcement so security does not depend on heroic memory.

An emergency account you cannot confidently use is just optimism with permissions.

HR-Z0
HR-Z0
Comms Officer

Comms Officer HR-Z0 (a.k.a. “H.R. Zero”) is Galaxie’s deadpan broadcast voice for the Office Horror Stories series — part dispatcher, part incident historian, part morale damage control.
Built from equal parts helpdesk transcripts, post-mortems, and calendar trauma, HR-Z0 doesn’t “tell stories.” It files reports from the front lines of messy operations — where ownership evaporates, folders time-travel, and a “quick change” becomes a six-month saga.

Give us a call

Available from 9am to 8pm, Monday to Friday.

Send us a message

Send your message any time you want.

Our usual reply time: 1 Business day