CtrlK
BlogDocsLog inGet started
Tessl Logo

building-identity-governance-lifecycle-process

Builds comprehensive identity governance and lifecycle management processes including joiner-mover-leaver automation, role mining, access request workflows, periodic recertification, and orphaned account remediation using IGA platforms. Activates for requests involving identity lifecycle management, JML processes, role-based access provisioning, or identity governance program design.

55

Quality

63%

Does it follow best practices?

Impact

No eval scenarios have been run

SecuritybySnyk

Passed

No known issues

Optimize this skill with Tessl

npx tessl skill review --optimize ./skills/building-identity-governance-lifecycle-process/SKILL.md
SKILL.md
Quality
Evals
Security

Quality

Discovery

100%

Based on the skill's description, can an agent find and select it at the right time? Clear, specific descriptions lead to better discovery.

This is a strong skill description that clearly defines a specific domain (identity governance and lifecycle management), lists concrete capabilities, and provides explicit trigger conditions. It uses appropriate third-person voice and includes both acronyms and full terms for discoverability. The description is well-structured and would allow Claude to confidently select this skill when relevant requests arise.

DimensionReasoningScore

Specificity

Lists multiple specific concrete actions: joiner-mover-leaver automation, role mining, access request workflows, periodic recertification, and orphaned account remediation. These are clearly defined, actionable capabilities.

3 / 3

Completeness

Clearly answers both 'what' (builds identity governance processes including specific capabilities) and 'when' ('Activates for requests involving identity lifecycle management, JML processes, role-based access provisioning, or identity governance program design').

3 / 3

Trigger Term Quality

Includes strong natural keywords users would say: 'identity lifecycle management', 'JML processes', 'role-based access provisioning', 'identity governance', 'joiner-mover-leaver', 'recertification', 'orphaned account'. Covers both acronyms (JML, IGA) and full terms.

3 / 3

Distinctiveness Conflict Risk

Highly specific niche in identity governance and lifecycle management. The domain-specific terminology (JML, IGA, recertification, orphaned accounts) makes it very unlikely to conflict with other skills.

3 / 3

Total

12

/

12

Passed

Implementation

27%

Reviews the quality of instructions and guidance provided to agents. Good implementation is clear, handles edge cases, and produces reliable results.

This skill is comprehensive in coverage of identity governance lifecycle management but severely suffers from verbosity — it reads more like a tutorial or reference architecture document than a concise skill instruction. The massive inline code blocks, while structured, are not truly executable and explain patterns Claude could derive from much shorter guidance. The lack of validation checkpoints in a workflow involving automated access provisioning and the monolithic structure significantly reduce its effectiveness as a skill file.

Suggestions

Reduce content by 70%+ by replacing full class implementations with concise patterns showing key decision points (e.g., lifecycle state transitions as a compact table, risk classification as a short config block) and trust Claude to implement the details.

Add explicit validation checkpoints between workflow steps, such as 'Verify HR connector returns expected employee count before proceeding' and 'Validate birthright role definitions with business stakeholders before enabling auto-provisioning.'

Split into multiple files: keep SKILL.md as a concise overview with the workflow steps and key decisions, then reference separate files like ROLE_MINING.md, ACCESS_REQUESTS.md, and ORPHAN_DETECTION.md for detailed implementations.

Remove the glossary table and 'Tools & Systems' section — Claude already knows what SailPoint, Saviynt, and Entra ID Governance are, and the term definitions add no actionable value.

DimensionReasoningScore

Conciseness

Extremely verbose at ~500+ lines. The identity lifecycle state machine, full Workday connector class, role mining engine, access request engine, and orphaned account detector are all massive code blocks that explain concepts Claude already understands. The glossary table defines terms like 'Authoritative Source' that need no explanation. Much of this could be condensed to patterns and key decision points rather than full class implementations.

1 / 3

Actionability

The code examples are fairly detailed and structured, but they are not truly executable — they depend on undefined clients (iga_client, risk_catalog, app_connectors) and hypothetical API responses. The Workday connector is the most concrete but still requires significant adaptation. The scenario section provides a good step-by-step approach but remains at a planning level rather than copy-paste ready.

2 / 3

Workflow Clarity

The 5-step workflow is clearly sequenced and logically ordered from lifecycle definition through remediation. However, there are no explicit validation checkpoints between steps — no 'verify the HR connector is returning data before proceeding to role mining' or 'validate birthright role definitions with business owners before automating provisioning.' For a process involving automated access changes (destructive/batch operations), this lack of validation gates caps the score.

2 / 3

Progressive Disclosure

This is a monolithic wall of content with no references to external files. All code, configuration, scenarios, and reference material are inline. The role mining engine, access request workflow, and orphaned account detection could each be separate referenced files. With no bundle files provided, there's no structure to support progressive disclosure, and the content makes no attempt to split or reference external resources.

1 / 3

Total

6

/

12

Passed

Validation

81%

Checks the skill against the spec for correct structure and formatting. All validation checks must pass before discovery and implementation can be scored.

Validation9 / 11 Passed

Validation for skill structure

CriteriaDescriptionResult

skill_md_line_count

SKILL.md is long (692 lines); consider splitting into references/ and linking

Warning

frontmatter_unknown_keys

Unknown frontmatter key(s) found; consider removing or moving to metadata

Warning

Total

9

/

11

Passed

Repository
mukul975/Anthropic-Cybersecurity-Skills
Reviewed

Table of Contents

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.