Back to Resources
M&A & Organisational Change

Why Divestitures Fail Without Deliberate Identity Separation

Divestitures are often treated as migrations. In reality, they are identity, access, and operating-model separation problems.

Divestitures are frequently described as the inverse of acquisitions. In practice, they are far more complex — and far less forgiving.

While acquisitions tolerate temporary overlap and coexistence, divestitures demand clean separation under tight timelines, legal scrutiny, and operational pressure. Treating them as standard migrations is one of the most common reasons they fail.

Separation is not the same as migration

A migration moves users and data from one platform to another. A divestiture must untangle years of shared identity, access, and trust relationships — often while both organisations continue operating.

  • Common failure points include:
  • shared identity providers
  • overlapping administrative access
  • undocumented dependencies between systems
  • automation that assumes a single organisation

Without deliberate separation design, these issues surface late — when risk is highest and options are limited.

Identity is the hardest boundary to draw

Identity underpins access to applications, collaboration platforms, automation, and data. In divestiture scenarios, it is also the most tightly coupled system.

  • Challenges frequently include:
  • service accounts shared across business units
  • group-based access models with unclear ownership
  • conditional access policies spanning both entities
  • administrative roles that cannot be cleanly divided

Effective separation requires identity to be treated as a programme workstream, not a technical afterthought.

Access decisions become legal and operational risks

During divestiture, access is no longer just an IT concern. It becomes a legal, regulatory, and reputational issue.

  • Poorly controlled access can result in:
  • unintended data exposure
  • audit findings post-separation
  • operational disruption on Day 1
  • prolonged transition service dependencies

Clear access models and enforced boundaries reduce the need for long-running transition arrangements and manual oversight.

Operating models matter as much as tooling

  • Successful divestitures align technical separation with operating reality. This means:
  • redefining ownership
  • re-establishing administrative responsibility
  • adjusting support and escalation paths
  • documenting decisions for post-separation teams

Tooling alone does not deliver separation. Operating models make it sustainable.

A more realistic approach

  • Divestitures succeed when separation is designed intentionally:
  • identity boundaries are defined early
  • access is minimised by default
  • automation is reviewed and adjusted
  • governance is explicit, not assumed

These programmes are demanding, but when handled deliberately, they allow both organisations to operate independently without ongoing entanglement.

Divestiture is not an event. It is a controlled unwinding of trust.

If you are navigating similar technical or organisational challenges.