One morning your system has 3 roles. By the end of the quarter, it has 300. Six months later, you’ve stopped counting.
This is large-scale role explosion in access control. It creeps up fast. Each new team, each edge-case permission, each one-off exception—every decision feels small at the time. But the weight adds up. Soon, you’re drowning in a tangle of overlapping roles, orphaned permissions, and brittle policies.
The problem isn’t just clutter. Role explosion bleeds into security. When you can’t see who really has access, you can’t control it. Audits become slow and painful. Onboarding a new engineer turns into decoding tribal knowledge. Offboarding means crossing your fingers you caught every dangling permission. The risk surface grows wide and invisible.
At scale, the old ways break. Static role-based access control (RBAC) struggles under complexity. Role hierarchies help but don’t solve the sprawl. Attribute-based access control (ABAC) promises flexibility, but without discipline, it spins into an untraceable web of rules. Mixing the two systems can double the mess.
The root cause is often fragmentation. Teams add roles to solve local needs without a shared source of truth. The names, scopes, and purposes drift. What starts simple becomes a maze of near-duplicates: admin, super_admin, system_admin—each with slightly different powers, none fully documented.