Every onboarding process is a potential attack surface, and privilege escalation is the most common exploit hiding there.
When a new hire joins, their account moves through states: creation, role assignment, and access expansion. If these steps lack strict controls, permissions can creep upward beyond what is necessary. This is privilege escalation inside the onboarding flow.
The risk starts with default roles. Many systems give new accounts broad access because it’s faster. In code, misaligned defaults allow users to see or modify data they should never touch. Combine that with weak verification during identity mapping and you have a direct path to administrative power.
Audit trails matter. Without them, you have no record to trace which onboarding actions expanded access. Logs should capture every role change and resource grant in real time. Pair logging with automated checks that trigger alerts when permissions exceed policy.