Identity & Access complete

Control over user identities, authentication mechanisms, and access management systems

L0 Unaware

No formal identity management; shared credentials and absent access controls expose the organisation to unquantified risk

Criteria

  • IAM-L0-C1 The organisation has no centralised identity directory. User accounts are created ad-hoc per system with no single source of truth
    Evidence guidance

    Review onboarding documentation and system admin interfaces; check whether a directory service (LDAP, AD, cloud IdP) exists

  • IAM-L0-C2 Shared or generic accounts (e.g., admin@, info@, root) are used for day-to-day operations, including access to production systems
    Evidence guidance

    Audit login records and account inventories across critical systems; look for accounts used by more than one natural person

Indicators

  • Passwords are stored in shared spreadsheets, sticky notes, or unencrypted vaults
  • No record exists of who accessed which system and when
  • Employee offboarding does not include a systematic access revocation step
  • Help-desk tickets reveal repeated password resets for generic accounts

Regulatory mappings

RegulationArticlesRiskNote
GDPRart-5, art-32criticalAbsence of access controls violates the integrity and confidentiality principles (Art 5(1)(f)) and the obligation to implement appropriate technical measures (Art 32)
NDSGart-8highFailure to ensure data security through technical measures as required by Art 8 nDSG
NIS2art-21highNIS2 Art 21(2)(j) mandates the use of multi-factor authentication; complete absence constitutes non-compliance

Upgrade path

Establish a single identity provider - even a cloud-managed one - and migrate all user accounts into it. Enable MFA on the five most critical systems. Eliminate shared accounts by assigning named user credentials.

Risk if stagnant

Without identity governance the organisation cannot attribute actions to individuals, making breach investigation, insider-threat detection, and regulatory compliance effectively impossible. A single compromised shared credential can grant an attacker lateral movement across all systems.

Typical characteristics
  • Ad-hoc account creation. Each application or server maintains its own local user database. When a new employee joins, administrators manually create accounts in each system - often with inconsistent usernames and passwords.
  • Shared credentials. Teams routinely share a single admin account for cloud consoles, databases, or SaaS tools. Password rotation, if it happens at all, requires coordinating across everyone who knows the current password.
  • No authentication governance. No deliberate decisions have been made about how users authenticate. Each system uses its own defaults, typically password-only, with no organisation-wide policy.
  • No joiners-movers-leavers process. When an employee leaves, their accounts may remain active for weeks or months because no one owns the offboarding checklist.
Why this is dangerous

Shared accounts eliminate accountability. If a data breach occurs, the organisation cannot determine which individual performed the malicious or negligent action. This makes forensic investigation unreliable, regulatory notification inaccurate, and legal liability difficult to assign.

From a regulatory standpoint, GDPR Art 32 requires "appropriate technical and organisational measures" to ensure security proportionate to the risk. Operating without basic identity controls falls well below any reasonable interpretation of "appropriate."

Sovereignty implications

At this level, sovereignty is not even a consideration - the organisation lacks the foundational controls required to reason about who has access to what. Identity sovereignty presupposes that an identity system exists in the first place.