Identity Governance Blog

Why Boards Still Struggle to See Identity Risk

Blog Summary

Many organizations report identity process metrics that look reassuring, but those signals often miss whether access is actually appropriate and risk is being reduced as people and systems change, especially at scale.

Identity risk indicators such as excessive privileges, orphaned accounts, and delayed access revocation regularly surface in breach reports, audit findings, and post-incident reviews. Yet in many organizations, those same indicators remain absent from routine board-level reporting. As a result identity investments often struggle to gain sustained executive attention.

This disconnect is not because boards underestimate the importance of identity. It’s because they are often shown signals that describe operational activity rather than security exposure.

Research from Omada’s State of IGA 2026 report reinforces this disconnect. While identity automation and AI-driven systems are accelerating across the enterprise, many executives still lack visibility into basic exposure indicators such as privileged access, orphaned accounts, and access revocation timelines.

Most executive reporting on identity focuses on activity: how quickly access is provisioned, how many certifications were completed, how many tickets were closed. These operational metrics describe motion and effort. They do not describe exposure. And when boards see activity, they naturally interpret identity as an efficiency issue rather than as a material risk management concern.

 

Activity Metrics Create False Comfort

Provisioning and deprovisioning SLAs, certification completion rates, and workflow volumes are familiar and easy to report. They align neatly with service management models and operational scorecards. But they answer a limited question: Are identity processes running as designed?

They do not address the security concerns boards actually care about:

  1. Are access entitlements right-sized, or do users and systems retain excessive permissions?
  2. Are all human and non-human identities governed, clearly owned, and periodically reviewed?
  3. Is our Zero Trust posture being maintained, or are stale permissions and ungoverned identities weakening it over time?

Consider a common example. An organization may report that access is removed within 24 hours of an employee’s departure. On paper, this appears compliant. But if a high-risk individual retains privileged access for an entire day after leaving, that access is no longer appropriate for their role and creates a real exposure that the board would want to understand and manage.

Activity metrics can hide this issue by showing that a process was completed, but not whether access risk was reduced quickly enough.

The same pattern shows up in access certifications. Completing reviews on time looks reassuring. But if certifications do not meaningfully reduce excess or unused access, the underlying risk remains unchanged.

 

Why Scale Makes the Reporting Problem More Urgent

The limitations of activity-based identity reporting become more pronounced as identity environments scale.

Non-human identities, such as service accounts, APIs, bots, and AI agents, now outnumber human users by large margins in many organizations. Automation and agentic AI are accelerating that growth. Each new system, integration, or workflow introduces additional credentials and privileges, often with unclear ownership and inconsistent governance.

As a result, identity environments are growing faster than most governance and reporting models were designed to track. In this context, activity metrics such as provisioning speed, workflow completion rates, and certification timeliness can continue to improve even as real exposure increases.

This is the core issue for boards: activity scales cleanly, risk exposure does not.

When hundreds or thousands of identities are created automatically, completing workflows on time says little about whether access is appropriate, whether privileges are excessive, or whether unused credentials are accumulating. The larger and more automated the environment becomes, the less representative activity metrics are of actual identity risk.

As identity complexity increases, boards need visibility into exposure, not just confirmation that processes are running.

 

What Changes Board Conversations

When identity is framed in terms of exposure rather than activity, conversations change. Instead of debating process efficiency, executives begin to discuss:

  1. How much latent access risk exists
  2. How quickly risk is reduced when people or systems change
  3. Whether the organization can govern identity at its current scale

Metrics that reflect exposure, such as unused privileged access, orphaned accounts, access revocation time, and the scale of non-human identities, translate directly into risk discussions boards already understand. They connect identity governance to breach likelihood, audit outcomes, and operational resilience.

This shift does not require abandoning operational metrics. Those metrics still matter. However, they should not serve as the primary lens for executive oversight of identity security management.

 

From Reporting to Risk Management

Organizations that make this shift find that identity governance becomes easier to fund and easier to scale. When boards can clearly see exposure trends and ownership, identity investments are no longer abstract or reactive. They become deliberate risk management decisions.

For CISOs and identity leaders, that shift reframes the challenge. The issue is not showing that work is being done, but showing how identity controls reduce access risk in terms executives already use to oversee security and compliance.

 

Practical Guidance for Making the Shift

To help security and identity leaders bridge this gap, we recently published Tracking What Matters: Board-Level Identity Metrics for Modern Identity Security. The guide provides:

  1. A concise explanation of why traditional identity metrics fail to convey risk
  2. A short list of exposure-focused metrics boards can actually use
  3. A one-page, board-ready identity risk scorecard
  4. Practical guidance for introducing these metrics without overwhelming executives

The goal is not to add more reporting, but to support better conversations using the same metrics executives rely on to manage risk.

When identity metrics reveal exposure instead of activity, identity security earns its place alongside financial, operational, and strategic risk on the executive agenda.

Tracking What Matters

This guide is designed as a practical tool for CISOs and IAM leaders to shift board conversations from “Are we efficient?” to “Are we exposed?”.

Learn more

Written by Robert Imeson
Last edited Mar 05, 2026

FREQUENTLY ASKED QUESTIONS

What does “identity risk” mean in board-level reporting?

Identity risk refers to security exposure created by access and credentials, including excessive privileges, orphaned accounts, and delayed access revocation. In board-level reporting, it means highlighting whether access is appropriate and governed, not only whether identity tasks were completed. This helps executives see identity as a material risk management issue.

Why do activity-based identity metrics fail to show real exposure?

Metrics like provisioning speed, certification completion rates, and ticket volumes show operational motion and effort, which can create false comfort. They answer whether processes ran as designed, but they do not show whether permissions were right-sized or whether stale access persisted. Boards often interpret identity as efficiency when exposure indicators are missing.

How can identity reporting shift from activity to exposure?

A shift starts by adding exposure-focused metrics such as unused privileged access, orphaned accounts, access revocation time, and the scale of non-human identities. These measures connect identity governance to breach likelihood, audit outcomes, and operational resilience in terms boards already use. Operational metrics can remain, but they should not be the primary lens.

What governance questions should boards ask about identities at scale?

Boards can ask whether all human and non-human identities are governed, clearly owned, and periodically reviewed, and whether privileges remain appropriate over time. They can also ask whether a Zero Trust posture is being maintained or weakened by stale permissions and ungoverned identities. These questions focus attention on exposure trends, not only workflow completion.

What is a practical first step to improve board conversations about identity risk?

Use a concise, board-ready scorecard that emphasizes exposure indicators and how quickly risk is reduced when people or systems change. The guide titled Tracking What Matters: Board-Level Identity Metrics for Modern Identity Security describes why traditional metrics fall short and offers a short list of exposure-focused metrics. The goal is better risk conversations without overwhelming executives.

Let's Get
Started

Let us show you how Omada can enable your business.