Worked Examples
These examples walk through complete scenarios — from inputs to actions to outputs. Use them as templates for similar situations.
Onboard a W-2 Employee
Section titled “Onboard a W-2 Employee”Scenario: New hire joining the Engineering team.
Actions
Section titled “Actions”- Create user in
/w2/w2-probation. - Add to roster:
prv-org-people-w2-active. - Add to team:
prv-eng-team-apps. - Subscribe to mail lists:
prv-team-mail-announceprv-team-mail-all-staffprv-team-mail-eng-updates
- Grant roles (as approved):
prv-eng-role-gl-developer(90 days, renewable)prv-eng-role-aws-idc-dev-developer(90 days)
- After onboarding complete: Promote from
/w2/w2-probationto/w2/w2-active.
Artifacts
Section titled “Artifacts”- Ticket with approvals
- GAM output showing group additions
- Role grant with expiry date
Create a New Customer Engagement
Section titled “Create a New Customer Engagement”Scenario: New customer “Slope Clinical” (slug: slope), first project “Modernization” (slug: mod).
Actions
Section titled “Actions”-
Create umbrella groups:
prv-ops-cus-slope-prosrvprv-ops-cus-slope-salesprv-ops-cus-slope-cpocprv-ops-cus-slope-announce
-
Provision drives:
EXT_PRV_Customers-SlopeClinical_COLLAB_Active_PrivateINT_PRV_Customers-SlopeClinical_TEAM_Active_PrivateINT_PRV_Customers-SlopeClinical_STRICT_Active_Confidential
-
Create project triplet:
prv-eng-prj-slope-mod-driprv-eng-prj-slope-mod-deliveryprv-eng-prj-slope-mod-client
-
Create project folders in each drive:
01_slope_mod/00_preengagement/01_kickoff/02_discovery/03_delivery/... -
Set ACLs:
- COLLAB:
...-mod-dri(Editor),...-mod-delivery(Commenter),...-mod-client(Commenter) - TEAM:
...-mod-dri(Editor),...-mod-delivery(Editor) - STRICT:
...-mod-dri(Editor) only
- COLLAB:
Set Up Security Alerting Pipeline
Section titled “Set Up Security Alerting Pipeline”Scenario: 1Password breach alerts need to reach on-call security engineers.
Actions
Section titled “Actions”-
Create intake:
prv-sec-intake-op-events- Allowlist: 1Password sender addresses
- Subject prefix:
[OP] - Archive-only (no human subscribers)
-
Create alerts:
prv-sec-alerts-op-breach- Members: on-call security engineers (max 5)
- Subject prefix:
[OP-CRIT]
Wiring
Section titled “Wiring”1Password → prv-sec-intake-op-events (all events, archive)1Password → prv-sec-alerts-op-breach (critical findings → on-call)Offboard a Contractor
Section titled “Offboard a Contractor”Scenario: Engineering contractor’s engagement ends.
Actions
Section titled “Actions”- Suspend account. Move to
/contractors/contractors-engineering-offboarded. - Remove from all Role groups:
prv-eng-role-gl-developerprv-eng-role-aws-idc-dev-developer- Any project-specific roles
- Remove from Team:
prv-eng-team-apps. - Move to offboarded roster:
prv-org-people-contractors-eng-offboarded. - Transfer content ownership (Drive files).
- Remove from all mail lists.
- License to zero.
- Retain Vault holds per contract.
Temporary Zoom Host Role
Section titled “Temporary Zoom Host Role”Scenario: Marketing needs temporary Zoom webinar host access for an event.
Actions
Section titled “Actions”- Grant role: Add marketing team member to
prv-mktg-role-zm-producer. - Set expiry: 14 days (event + buffer).
- Document: Ticket with justification, approver, expiry date.
- After event: Role auto-expires or manual removal.
- Evidence: Log grant/revoke in ticket.
Platform Admin Account Setup
Section titled “Platform Admin Account Setup”Scenario: Setting up the shared AWS admin identity.
Actions
Section titled “Actions”- Create account:
prv-plt-admin-aws@{domain}. - Display name:
[ PRV ] PLT Admin – AWS. - Place in OU:
/automation-accounts/automation-accounts-active. - Store credentials: Root password + MFA in 1Password vault with restricted access.
- Create owner group:
prv-plt-auto-owners-awswith 2+ PLT engineers. - Document: Scopes, access procedure, emergency-use-only policy.
- Schedule: Quarterly credential rotation + access review.
Quarterly Review Process
Section titled “Quarterly Review Process”Scenario: Quarterly controls review.
Checklist
Section titled “Checklist”-
Group ownership: Verify every group has >= 2 owners.
Terminal window # Find groups with fewer than 2 ownersgam print group-members type owner | awk -F',' '{count[$1]++} END{for(g in count) if(count[g]<2) print g}' -
External members on TEAM/STRICT: Must be 0.
Terminal window gam print drivefileacls query "name contains '_STRICT_'" | grep -v "@provisionr.com" -
Role attestation: All role owners confirm members are still justified.
-
OAuth/Marketplace: Review allowlists. Remove unused apps.
-
Breakglass test: Unsuspend → login → scoped task → resuspend → evidence.
-
Automation scopes: DWD grants still minimal? Keys rotated?
-
Mail hygiene: Allowlists current? Moderation queues clear?