Vendor we fired 2 years ago still has VPN access and admin rights to our backup system

Posted by SpecialistAd7913@reddit | sysadmin | View on Reddit | 68 comments

Started here three months ago. Been doing security cleanup and found VPN accounts for an MSP we stopped using in 2023. Contract ended, relationship over, but nobody disabled their technical access.

Five technicians from that MSP still have active VPN credentials. Checked what they can reach and it's bad. Domain admin on some servers. Full access to our Veeam backup environment. Read access to file shares with customer data. RDP to several production hosts. They could log in right now if they wanted to and we'd have no idea it wasn't one of our own admins because the accounts look legitimate in all the logs.

Asked around about offboarding process for vendors. There isn't one. When contracts end procurement closes the purchase order and that's it. Nobody tells IT to revoke technical access. We have a formal process for employee terminations but vendor relationships just fade away and their access stays forever. Started digging and found three other former vendors with active accounts. Consultants from projects that finished years ago. Implementation partners. A monitoring service we replaced.

The scary part is I only found these by manually going through account lists. No automated way to flag vendor accounts that outlived their contracts. No tie between procurement system and IAM. If I hadn't randomly decided to audit VPN access this month these accounts would still be sitting there. How do orgs actually track vendor technical access lifecycle when procurement and IT don't talk to each other?