Identity checks
Require evidence that matches the risk level of the account: verified email, known device, manager approval, direct call-back, or an internal identity workflow. The exact checks should be documented before an incident happens.
Approval boundaries
Decide who may approve a reset, whether two-person approval is required, and which accounts are off-limits without executive or security review.
Post-reset cleanup
After a reset, revoke old sessions, require the user to enroll a new factor, and record the reason, approver, and time in a durable audit log.
Implementation checklist
- Create a written runbook for resets.
- Limit the number of people who can execute emergency recovery.
- Audit every reset and review the log on a schedule.
Policy cautions
- A recovery flow that skips identity proof can become an account-takeover path.
- Do not let support staff improvise when a recovery runbook should already exist.