CtrlK
BlogDocsLog inGet started
Tessl Logo

building-identity-governance-lifecycle-process

Builds comprehensive identity governance and lifecycle management processes including joiner-mover-leaver automation, role mining, access request workflows, periodic recertification, and orphaned account remediation using IGA platforms. Activates for requests involving identity lifecycle management, JML processes, role-based access provisioning, or identity governance program design.

75

Quality

71%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/building-identity-governance-lifecycle-process/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly defines a specialized domain with concrete actions and explicit trigger conditions. It uses appropriate third-person voice, lists multiple specific capabilities, and includes both abbreviated and full-form trigger terms. The description effectively balances comprehensiveness with conciseness.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: joiner-mover-leaver automation, role mining, access request workflows, periodic recertification, and orphaned account remediation. These are clearly defined, domain-specific capabilities.

3 / 3

Completeness

Clearly answers both 'what' (builds identity governance processes including specific capabilities) and 'when' ('Activates for requests involving identity lifecycle management, JML processes, role-based access provisioning, or identity governance program design'). The trigger clause is explicit.

3 / 3

Trigger Term Quality

Includes strong natural keywords users in this domain would use: 'identity lifecycle management', 'JML processes', 'role-based access provisioning', 'identity governance', 'joiner-mover-leaver', 'recertification', 'IGA platforms'. Good coverage of both acronyms and full terms.

3 / 3

Distinctiveness Conflict Risk

Highly specialized niche in identity governance and lifecycle management. The specific terminology (JML, IGA, recertification, orphaned accounts) makes it very unlikely to conflict with other skills. This is a clearly distinct domain.

3 / 3

Total

12

/

12

Passed

Implementation

42%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

The skill demonstrates deep domain expertise in identity governance with highly actionable, executable code examples covering the full JML lifecycle. However, it is severely over-engineered for a SKILL.md — the massive inline code blocks, glossary of well-known terms, and lack of progressive disclosure make it a poor fit for the context window. It would benefit enormously from being restructured as a concise overview with references to detailed implementation files.

Suggestions

Extract the large code blocks (HR connector, role mining engine, access request engine, orphaned account detector) into separate referenced files (e.g., HR_CONNECTOR.md, ROLE_MINING.md) and keep only a brief summary with key patterns in the main SKILL.md.

Remove the Key Concepts glossary table — Claude already knows these identity governance terms and definitions waste tokens.

Replace the full class implementations with concise code snippets showing only the critical patterns (e.g., lifecycle state transitions, risk-level classification logic) and link to complete implementations.

Add explicit validation checkpoints between workflow steps, such as 'Verify HR delta sync returns expected employee count before proceeding' and 'Validate birthright role definitions with business owners before enabling auto-provisioning.'

DimensionReasoningScore

Conciseness

Extremely verbose at ~500+ lines. The identity lifecycle state machine, HR connector, role mining engine, access request engine, and orphaned account detector are all fully fleshed out classes that Claude could generate on demand. The glossary table defines terms like 'Authoritative Source' and 'Orphaned Account' that Claude already knows. Much of this content is reference-level detail that doesn't need to live in a SKILL.md.

1 / 3

Actionability

The code examples are concrete, executable Python with real class structures, method implementations, and data models. The access request workflow configuration, role mining logic, and orphaned account detection are all copy-paste ready with clear interfaces and realistic field mappings.

3 / 3

Workflow Clarity

The 5 steps provide a logical sequence for building an identity governance program, and the scenario section outlines a practical approach. However, there are no explicit validation checkpoints between steps (e.g., 'verify HR connector returns expected data before proceeding to role mining'), and no feedback loops for error recovery in what is a complex, multi-system integration process.

2 / 3

Progressive Disclosure

This is a monolithic wall of content with no references to external files. The HR connector code, role mining engine, access request workflow, and orphaned account detector could each be separate reference files. Everything is inline, making the skill overwhelming and poorly structured for quick reference.

1 / 3

Total

7

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

skill_md_line_count

SKILL.md is long (692 lines); consider splitting into references/ and linking

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.