âWe trust our team.â
Thatâs how most scaleups start. And honestly, trust is a good thing.
Youâre moving fast, trying to ship, and the last thing anyone wants is to slow down for access requests. So everyone gets full accessâAWS, GitHub, staging, prod.
It works⌠until it doesnât.
Because the more access you grant by default, the harder it is to control later.
At some point, trust without boundaries becomes a liability.
The Access Problem That Grows in the Background
You rarely notice this happening. Thatâs part of what makes it so tricky.
- A former engineer still has root in AWS
- Contractors keep access to production even after their contract ends
- Devs can see customer data they donât actually need
- Staging and prod? Same roles, same secrets, no clear boundary
Thereâs no malice. Just inertia.
Until one day, a laptop gets compromised or a token leaksâand someone who shouldnât be able to bring down prod suddenly can.
Itâs Not About Blame. Itâs About Surface Area.
This isnât about bad intentions or “locking people out.”
Itâs about understanding that access is attack surface.
When everyone can do everything, you canât:
- Limit the scope of damage
- Track what happened (or who did it)
- Prove to anyone that your systems are secure
This kind of sprawl turns invisibleâuntil a breach, or a compliance request, forces you to shine a light on it.
How to Start Shrinking the Blast Radius
You donât need a 6-month IAM project. You just need a systems mindset and a few small wins that compound.
Hereâs what weâve seen work:
â
Audit access across cloud and CI/CD. Who really needs write access?
â
Reclaim old access. Expire contractor credentials. Remove dormant users.
â
Segment environments. Prod and staging should never share roles, buckets, or secrets.
â
Design for least privilege. One role, one purpose. Thatâs it.
â
Automate the cleanup. Tie offboarding to Slack exits or HR workflows. No more manual tracking.
These are simple changes. But they add up quickly.
What Happens If You Donât
As you grow from 10 to 50 engineers, access complexity increases faster than you think.
If you donât get ahead of it:
- Onboarding slows down
- Incident response gets messy
- Compliance turns into a fire drill
- And your team starts bypassing the system because they donât trust it
Security becomes friction. And friction leads to shortcuts.
One Small Shift
You donât have to fix everything this week.
But it helps to start thinking about access not as a blockerâbut as infrastructure.
Good IAM isnât about denying access.
Itâs about making access safe, intentional, and trackable.
And when thatâs in place, your team can keep moving fastâwithout creating risks that compound later.