Who's Your Danny?

Avatar photo

Bill Schaumann

Danny Smeltzer has worked for the company for 25 years fulfilling many roles. Currently, Danny is the operations manager. He also was once the HR manager and also served for five years as a production manager. During his time with the company Danny has become the expert in many of the systems and applications and has full access to most operations needed for the plant to run. Danny also makes sure his teams have full system access to do their jobs. When new employees are hired he provisions system access based on a profile that he knows works well. That way Danny’s new teammates can hit the ground running. The profile is a copy of Danny’s which works because it has been accumulating access rights over the course of Danny’s long career. With no defined roles or governance over access to sensitive data, the company has inadvertently created risks of excessive access to, and unauthorized disclosure of sensitive information. They should have thought about a concept called least privilege.

A stalwart of many security and privacy regulations and standards, least privilege means that individuals should only be given the least amount of access to data needed to perform a job function. Access control based on job function or role assignment is a way for organizations to provision access to sensitive data only as needed. It provides comprehensive visibility and control over data across a variety of data systems and repositories. By provisioning access based on the role, and also deprovisioning it when an employee’s role changes, access to sensitive information can be limited to a strict need-to-know least privilege pattern. By routinely reviewing employee access to sensitive files these risks can be monitored and reduced.

How Least Privilege & Access Reviews Reduce Risk

Effective access control and review capabilities provide organizations with comprehensive visibility and control over who has access to sensitive data across both on-prem and cloud-based data sources. In addition to reducing the risk of breach, provisioning and reviewing access to sensitive data can help in ensuring compliance with regulatory requirements and security standards. Access reviews typically done at the data source level should be done on a regular basis. As employees, vendors, and partners come and go or change roles, updating old access rights can often be difficult to manage or can become an afterthought. Because teams cannot easily spot excessive or open permissions, or tie them back to the people behind the data, audits become firefights, compliance costs soar, and overexposed data invites breaches and regulatory penalties.

6 Must-Haves for Secure Access Control

In order to effectively review and control access to sensitive data a few functions are required:

  • Have visibility into what sensitive data exists in which repositories.
  • Have an easy way to understand who has access to what data.
  • Have an automated way to spot open and excessive access to sensitive files.
  • Have a streamlined approach to obtaining and approving access authorizations.
  • Have policy-based controls to approve or revoke access on the riskiest entitlements.
  • Have the ability to provide accurate data access attestations.

Lightbeam Access Review: Audit-Ready & Automated

The LightBeam access review module provides streamlined, audit-ready access control management and attestations. Security analysts, IT teams, and data owners can launch a review for any drive, folder, group, or user. After the scan completes, a familiar spreadsheet-style view lists every internal, nested, and external identity with access. Files with excessive and open access are identified, and opportunities to reduce excessive access are created. Reviewers can investigate flagged permissions, initiate remediation, or confirm valid access and mark the review complete. Every decision, along with the reviewer name, timestamp, and follow-up action, is captured in an immutable audit log, giving regulators clear evidence and leaders confidence that critical data remains protected.

LightBeam’s Differentiators

– Identity-and-content-aware reviews – Data Identity Graph resolves every alias, service account, and shared mailbox to a real person, then overlays sensitive-data tags. Reviewers can answer “Who exactly can open Jane Doe’s salary file and why?” in one click.

– Three-state workflowUnreviewed, Reviewed, Flagged states mirror real-world decisions and drive accountability dashboards.

– Visual Access Traceability – Understand how someone gained access, through group, sub-group, direct-access, etc., and what or whose data they can see.

– Built-in Remediation – Decisions travel into Playbooks, so revocations are logged against the human owner, creating a crystal-clear audit trail.

– Re-run & Re-assign Reviews – Need to re-review after reorgs or audit cycles? One-click re-runs with assigned owners make it simple.

And Don’t be a Danny. Contact LightBeam for a demo of the leading data protection platform and learn more about LightBeam’s access control capabilities.

FAQ Section

Q1. What is “least privilege” in data security?
Least privilege means giving employees only the minimum access rights necessary to perform their job. This prevents excessive access, reduces insider threats, and keeps sensitive data secure.

Q2. Why is excessive access dangerous?
When employees accumulate access rights over years (like Danny), it creates “access sprawl.” This increases the chance of unauthorized disclosure, regulatory violations, and data breaches.

Q3. How often should organizations conduct access reviews?
Access reviews should be conducted regularly, ideally quarterly or aligned with audit cycles, to ensure employees, vendors, and partners only retain the access they need.

Q4. What challenges do companies face with manual access reviews?
Manual reviews are time-consuming, error-prone, and often lack visibility into who truly owns or uses the data. This makes compliance audits painful and costly.

Q5. How does LightBeam help with access governance?
LightBeam automates access reviews with identity-aware insights, visual traceability, and built-in remediation. Every action is logged in an immutable audit trail, giving regulators confidence and leaders peace of mind.

Related Posts

India’s Journey to Protect Personal Information
 blog card

India’s Journey to Protect Personal Information

Learn More
Third-Party Risk Management: Stop Accidental Data Exposure
 blog card

Third-Party Risk Management: Stop Accidental Data Exposure

Learn More
PCI: The ‘Non-Personal’ Personal Information
 blog card

PCI: The ‘Non-Personal’ Personal Information

Learn More