Identity & Access complete
Control over user identities, authentication mechanisms, and access management systems
L0 Unaware
No formal identity management; shared credentials and absent access controls expose the organisation to unquantified risk
Criteria
IAM-L0-C1The organisation has no centralised identity directory. User accounts are created ad-hoc per system with no single source of truthEvidence guidance
Review onboarding documentation and system admin interfaces; check whether a directory service (LDAP, AD, cloud IdP) exists
IAM-L0-C2Shared or generic accounts (e.g., admin@, info@, root) are used for day-to-day operations, including access to production systemsEvidence guidance
Audit login records and account inventories across critical systems; look for accounts used by more than one natural person
Indicators
- Passwords are stored in shared spreadsheets, sticky notes, or unencrypted vaults
- No record exists of who accessed which system and when
- Employee offboarding does not include a systematic access revocation step
- Help-desk tickets reveal repeated password resets for generic accounts
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-32 | critical | Absence of access controls violates the integrity and confidentiality principles (Art 5(1)(f)) and the obligation to implement appropriate technical measures (Art 32) |
NDSG | art-8 | high | Failure to ensure data security through technical measures as required by Art 8 nDSG |
NIS2 | art-21 | high | NIS2 Art 21(2)(j) mandates the use of multi-factor authentication; complete absence constitutes non-compliance |
Upgrade path
Establish a single identity provider - even a cloud-managed one - and migrate all user accounts into it. Enable MFA on the five most critical systems. Eliminate shared accounts by assigning named user credentials.
Risk if stagnant
Without identity governance the organisation cannot attribute actions to individuals, making breach investigation, insider-threat detection, and regulatory compliance effectively impossible. A single compromised shared credential can grant an attacker lateral movement across all systems.
Typical characteristics
- Ad-hoc account creation. Each application or server maintains its own local user database. When a new employee joins, administrators manually create accounts in each system - often with inconsistent usernames and passwords.
- Shared credentials. Teams routinely share a single admin account for cloud consoles, databases, or SaaS tools. Password rotation, if it happens at all, requires coordinating across everyone who knows the current password.
- No authentication governance. No deliberate decisions have been made about how users authenticate. Each system uses its own defaults, typically password-only, with no organisation-wide policy.
- No joiners-movers-leavers process. When an employee leaves, their accounts may remain active for weeks or months because no one owns the offboarding checklist.
Why this is dangerous
Shared accounts eliminate accountability. If a data breach occurs, the organisation cannot determine which individual performed the malicious or negligent action. This makes forensic investigation unreliable, regulatory notification inaccurate, and legal liability difficult to assign.
From a regulatory standpoint, GDPR Art 32 requires "appropriate technical and organisational measures" to ensure security proportionate to the risk. Operating without basic identity controls falls well below any reasonable interpretation of "appropriate."
Sovereignty implications
At this level, sovereignty is not even a consideration - the organisation lacks the foundational controls required to reason about who has access to what. Identity sovereignty presupposes that an identity system exists in the first place.
L1 Dependent
Identity is managed through a cloud provider's native IAM service with limited organisational control over the identity lifecycle and data residency
Criteria
IAM-L1-C1All user identities are stored and managed in a single cloud-provider IAM service (e.g., Microsoft Entra ID, Google Workspace, AWS IAM Identity Center) with no on-premises or self-hosted fallbackEvidence guidance
Confirm that the identity provider is a SaaS-only service; verify there is no secondary IdP or directory synchronisation to an on-prem store
IAM-L1-C2All authentication methods, including multi-factor authentication, are provided and controlled by the cloud identity provider with no organisation-managed alternativeEvidence guidance
Verify that MFA methods (push notifications, TOTP seeds, SMS) are entirely managed within the provider's console; confirm the organisation does not operate any independent authentication factor (e.g., own FIDO2 key management, own TOTP issuer)
IAM-L1-C3The organisation has no control over where identity data is stored or processed. Region selection is either unavailable or left at provider defaultsEvidence guidance
Check the IdP's data-residency settings; review the provider's sub-processor list for identity-related data flows
IAM-L1-C4The organisation has no independent record of who has access to what. Access inventories exist only within the provider's platform and cannot be exported or verified externallyEvidence guidance
Ask whether the organisation maintains any access inventory outside the provider's console; determine if access data can be exported in a machine-readable format for independent analysis
Indicators
- The organisation's entire workforce authenticates via a single SaaS identity provider with no disaster-recovery IdP
- Password policies and session controls are configured within the provider's console and cannot exceed the provider's feature set
- Identity audit logs are only available through the provider's portal and subject to the provider's retention limits
- The organisation cannot export a complete, machine-readable copy of its identity directory on demand
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-25, art-32 | high | Dependency on a non-EU provider for identity processing may conflict with data-protection-by-design (Art 25) and raises transfer-risk concerns under Art 5 |
CLOUD-ACT | 18-usc-2703 | high | US-headquartered identity providers are subject to CLOUD Act compelled disclosure, potentially granting foreign authorities access to authentication metadata and directory information |
NIS2 | art-21 | medium | Basic MFA satisfies the letter of Art 21(2)(j), but full dependency on a single provider introduces supply-chain risk under Art 21(2)(d) |
Upgrade path
Negotiate a Data Processing Agreement (DPA) with the identity provider that includes explicit data-residency commitments and audit rights. Configure SAML or OIDC federation so that authentication flows through a protocol you control. Begin exporting identity audit logs to an independent SIEM or log archive.
Risk if stagnant
Total dependency on a single cloud IdP creates a single point of failure for all authentication. Provider outages, policy changes, or geopolitical actions (e.g., sanctions, export controls) could lock the entire organisation out of its own systems. The CLOUD Act exposure means a foreign government could compel access to your directory and authentication metadata without your knowledge.
Typical characteristics
- Single cloud IdP. All employees authenticate through a provider like Microsoft Entra ID (formerly Azure AD), Google Workspace, or Okta. The directory, authentication engine, and policy enforcement all run on the provider's infrastructure.
- Provider-managed MFA. Multi-factor authentication is enabled, typically via the provider's mobile app or SMS-based codes. Hardware tokens or FIDO2 keys are not yet in use.
- No data-residency control. The identity directory and associated metadata (login timestamps, device fingerprints, group memberships) are stored in regions chosen by the provider, often in the United States.
- Limited portability. The organisation cannot easily migrate to a different identity provider. Group structures, conditional access policies, and application integrations are tightly coupled to the specific provider's API and data model.
Why this matters for sovereignty
Identity is the control plane for everything else. Whoever controls identity controls who can access data, deploy infrastructure, and approve changes. When that control plane is entirely managed by an external provider - particularly one subject to foreign jurisdiction - the organisation's operational sovereignty is fundamentally dependent on that provider's continued availability, goodwill, and legal posture.
Under the US CLOUD Act, American authorities can compel US-headquartered providers to disclose data - including identity metadata - regardless of where it is stored. This means an organisation's directory information, authentication logs, and group memberships could be accessed without the organisation's knowledge or consent.
Common misconceptions
- "We use SSO, so we control identity." SSO federated through a cloud IdP merely centralises authentication - it does not give the organisation control over the identity store itself.
- "The provider is ISO 27001 certified." Certification demonstrates the provider's internal controls, not the organisation's sovereignty over its own data. The organisation remains a tenant, not an operator.
L2 Contractual
Identity management is backed by formal contractual obligations including DPAs, data-residency clauses, and federation standards, but the provider still controls the identity store
Criteria
IAM-L2-C1A Data Processing Agreement (DPA) is in place with the identity provider that specifies data-residency requirements, sub-processor restrictions, and audit rightsEvidence guidance
Obtain the signed DPA; verify it includes jurisdiction-specific data-residency commitments (e.g., EU-only processing), a sub-processor notification mechanism, and the right to conduct or commission audits
IAM-L2-C2SAML 2.0 or OpenID Connect (OIDC) federation is configured between the cloud IdP and all business-critical applications, using organisation-owned domain names and metadata endpointsEvidence guidance
Review federation configurations; confirm the organisation controls the SAML/OIDC metadata URLs and signing certificates, and that relying parties are registered under organisation-owned domains
IAM-L2-C3Regular access reviews are conducted using provider tooling, with results exported to an independent system for retention and audit trail purposesEvidence guidance
Request evidence of the last two access review cycles; confirm that review results are archived outside the provider's platform (e.g., in an internal GRC tool or document management system)
Indicators
- The organisation maintains a signed, current DPA with its identity provider that specifies EU or Swiss data residency
- Federation metadata (SAML/OIDC) is published under an organisation-owned domain and signing certificates are managed internally
- Identity-related audit logs appear in the organisation's own SIEM with at least 12 months of retention
- Access review reports are stored in an internal GRC tool, not solely in the provider's console
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-25, art-32 | medium | Contractual safeguards (DPA, SCCs) address Art 5 transfer requirements and Art 25 data-protection-by-design, but enforcement depends on provider compliance |
NDSG | art-7, art-8 | medium | DPA and data-residency clauses support Art 8 security requirements; Art 7 transparency obligations are partially met through documented processing activities |
DORA | art-9 | medium | DORA Art 9 requires ICT risk management frameworks including access control; contractual obligations with the IdP provider must be included in the ICT third-party risk register |
CLOUD-ACT | 18-usc-2703 | medium | Contractual restrictions do not override compelled disclosure under the CLOUD Act; however, DPA clauses requiring notification of government access requests provide early warning |
Upgrade path
Deploy a self-managed identity provider (e.g., Keycloak, Authentik, or on-premises Active Directory) as the authoritative identity source. Configure the cloud IdP as a downstream federation target rather than the master directory. Introduce hardware-based authentication (FIDO2 security keys) for privileged accounts. Implement jurisdiction-aware conditional access policies.
Risk if stagnant
Contractual protections create a legal framework but do not provide technical enforcement. The provider retains the ability to modify service behaviour, change sub-processors, or comply with foreign government demands despite contractual restrictions. In a geopolitical crisis or provider insolvency, contracts alone cannot guarantee continued access to the identity infrastructure.
Typical characteristics
- Negotiated DPA with specifics. The Data Processing Agreement goes beyond the provider's standard template. It includes jurisdiction-specific data-residency commitments (e.g., identity data processed only within the EU/Switzerland), sub-processor change notification with objection rights, and audit clauses that permit third-party assessments.
- Federation with organisational control. SAML 2.0 or OIDC protocols are configured so that authentication flows use organisation-owned domain names and certificates. This provides protocol-level portability - applications integrate with a federation endpoint the organisation controls, even though the underlying IdP is still cloud-managed.
- Independent log retention. Audit logs from the identity provider are streamed to an organisation-controlled SIEM (e.g., Splunk, Elastic, or a managed Swiss SIEM provider). This ensures that authentication events are preserved independently of the provider's retention policies and access controls.
- Documented access reviews. Periodic access certification campaigns are conducted using provider tooling, but the results are exported and stored in an independent GRC platform for regulatory evidence and long-term retention.
The contractual gap
The fundamental limitation of Level 2 is that contractual obligations are only as strong as the enforcement mechanisms behind them. Key risks include:
- Jurisdictional override. A foreign court order or government directive can compel the provider to act contrary to contractual commitments. The CLOUD Act, for example, explicitly overrides contractual data-residency restrictions for US-headquartered providers.
- Unilateral service changes. Providers routinely update terms of service, deprecate features, or modify data-processing practices. While DPA clauses may require notification, the organisation's recourse is typically limited to termination - which, given migration complexity, is rarely practical.
- Audit limitations. Even robust audit clauses rarely grant the organisation real-time technical inspection of the provider's identity infrastructure. Audits are periodic, scoped, and often conducted by the provider's chosen auditors.
When Level 2 is appropriate
For many organisations, Level 2 represents a reasonable balance between sovereignty and operational pragmatism. It is appropriate when:
- The organisation's regulatory environment accepts contractual safeguards as a valid risk-mitigation measure
- The identity data being processed is not classified as highly sensitive or subject to strict localisation mandates
- The organisation lacks the internal expertise to operate a self-managed identity platform reliably
- A credible migration plan to Level 3 exists and can be triggered if the risk posture changes
L3 Controlled
The organisation operates a self-managed identity provider as the authoritative source, federating outward to cloud services while retaining technical control over authentication, directory data, and access policy enforcement
Criteria
IAM-L3-C1A self-managed identity provider (e.g., Keycloak, Authentik) serves as the authoritative identity source; cloud IdPs consume identities via federation rather than owning themEvidence guidance
Inspect the identity architecture diagram; confirm the self-managed IdP is the master directory and that cloud IdPs (e.g., Entra ID, Google Workspace) are configured as federation targets or downstream consumers via SAML/OIDC
IAM-L3-C2Authentication factors for privileged accounts are managed by organisation-controlled infrastructure, not delegated to a third-party provider (e.g., organisation-managed FIDO2 keys or smartcard PKI rather than provider-managed push notifications)Evidence guidance
Confirm that the MFA enrolment, seed generation, and verification for privileged accounts are handled by the self-managed IdP or organisation-owned hardware, not by an external provider's authentication service
IAM-L3-C3The organisation can perform a full identity-provider failover or migration without losing user accounts, group memberships, or access policiesEvidence guidance
Request documentation of the DR/migration plan; verify that identity data is regularly exported in a portable format (SCIM, LDIF, or equivalent) and that a failover test has been conducted within the past 12 months
Indicators
- The organisation operates a Keycloak, Authentik, or equivalent self-managed identity provider, hosted on infrastructure within the organisation's legal jurisdiction
- Cloud provider directories (Entra ID, Google Workspace) are provisioned via SCIM or federation from the self-managed IdP - not the reverse
- FIDO2 security keys are issued to all administrators and are required for privileged access; the organisation maintains a hardware token inventory
- Conditional access policies reference geographic location and device compliance, and these policies are defined in the self-managed IdP rather than solely in a cloud provider console
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-25, art-32 | low | Self-managed identity infrastructure supports data-protection-by-design (Art 25) and enables the organisation to implement technical measures commensurate with risk (Art 32) without dependency on a third-party provider's feature roadmap |
NDSG | art-7, art-8 | low | Full control over the identity store satisfies Art 8 data-security requirements; the organisation can provide transparent processing information as required by Art 7 |
NIS2 | art-21 | low | Self-managed IdP with FIDO2 and conditional access addresses Art 21 requirements for access control, MFA, and supply-chain risk management comprehensively |
DORA | art-9 | low | Reducing dependency on third-party ICT providers for identity aligns with DORA Art 9 ICT risk management requirements and reduces concentration risk |
CLOUD-ACT | 18-usc-2703 | low | Self-managed identity infrastructure hosted in a domestic jurisdiction is not directly subject to CLOUD Act compelled disclosure; federated cloud services receive only scoped tokens, not the full directory |
Upgrade path
Eliminate all remaining dependencies on external identity providers by bringing authentication for every application in-house. Evaluate decentralised identity standards (W3C DID, Verifiable Credentials) for inter-organisational trust scenarios. Implement a fully air-gapped identity backup that can restore operations without any external service dependency. Develop and test a zero-external-dependency authentication path for business-continuity scenarios.
Risk if stagnant
While Level 3 provides strong sovereignty, residual federation links to cloud providers still create indirect dependencies. If not actively managed, configuration drift in federated cloud IdPs can silently re-introduce provider-controlled authentication flows. The operational overhead of self-managed identity infrastructure also requires sustained investment in internal IAM expertise; neglect leads to security debt and potential compromise of the identity control plane.
Key capabilities at this level
- Bring Your Own Identity (BYOI). The organisation defines the identity lifecycle - creation, modification, suspension, deletion - independently of any cloud provider. Provisioning to cloud services is a downstream action, not the originating event.
- Hardware-based authentication. FIDO2 security keys or smartcards are mandatory for privileged accounts. This eliminates phishing-susceptible factors (SMS, push notifications) for the most sensitive access paths.
- Jurisdiction-aware access policies. Conditional access rules evaluate the user's geographic location, device compliance status, and the classification of the resource being accessed. A user attempting to access sensitive data from an unapproved jurisdiction is blocked or required to complete additional verification.
- Portable identity data. The identity directory can be exported in standard formats (LDIF, SCIM) and restored to a different platform. The organisation has tested this migration path and confirmed that user accounts, group memberships, and access policies survive the transition.
Operational considerations
Self-managed identity infrastructure demands operational maturity:
- High availability. The IdP is a Tier-0 service - if it is unavailable, no one can authenticate to anything. Clustering, geographic redundancy, and tested failover procedures are essential.
- Patch management. Self-managed software requires timely security patching. Keycloak, for example, has a regular release cadence that must be tracked and applied.
- Monitoring and alerting. Authentication failures, configuration changes, and anomalous login patterns must be monitored continuously. The organisation should have a dedicated identity operations function or a managed-service arrangement with a sovereignty-respecting provider.
- Key management. SAML signing keys, OIDC client secrets, and FIDO2 attestation certificates are critical secrets that require proper lifecycle management (rotation, revocation, backup).
Sovereignty posture
At Level 3 the organisation has achieved substantive identity sovereignty. It controls where identity data is stored, how authentication is performed, and under which conditions access is granted. Cloud providers receive only the minimum information necessary via federation tokens - they do not hold the master copy of the directory.
The primary remaining risk is operational: the federation links to cloud services still represent touch points that could be disrupted by provider action. A cloud provider could, for example, modify its federation implementation in a way that breaks interoperability, or impose new requirements that conflict with the organisation's policies.
L4 Autonomous
Fully self-hosted identity infrastructure with zero external provider dependency; the organisation holds complete, exclusive control over all authentication, authorisation, and identity lifecycle operations
Criteria
IAM-L4-C1All identity infrastructure - directory services, authentication engines, token issuance, and policy decision points - is self-hosted on organisation-controlled infrastructure within a known legal jurisdictionEvidence guidance
Audit the complete identity stack; confirm that no component relies on an external SaaS provider for runtime operation. Verify hosting location through infrastructure documentation and physical or virtual audit.
IAM-L4-C2The organisation can authenticate all users and enforce all access policies with zero dependency on external services, including DNS resolution, certificate authorities, or cloud-based MFA providersEvidence guidance
Conduct an isolation test: simulate complete external connectivity loss and verify that internal authentication and authorisation continue to function. Review the dependency map for any external call-outs during authentication flows.
IAM-L4-C3Cryptographic material for identity operations (signing keys, TLS certificates, FIDO2 attestation roots) is generated, stored, and rotated using organisation-controlled HSMs or equivalent tamper-resistant hardwareEvidence guidance
Inspect HSM deployment and key-management procedures; confirm that identity-critical keys are generated on-premises, never exported in plaintext, and rotated on a documented schedule
IAM-L4-C4The organisation has decentralised identity capabilities (W3C Verifiable Credentials, DID methods) deployed or has a documented, tested implementation plan for inter-organisational trust without relying on a centralised identity brokerEvidence guidance
Review whether DID/VC infrastructure is deployed or a documented implementation plan exists; confirm that the organisation can issue and verify credentials without depending on a third-party identity federation service
Indicators
- The complete identity stack (directory, authentication, authorisation, MFA, certificate issuance) runs on organisation-owned or exclusively-leased infrastructure with no SaaS dependencies
- An annual isolation test demonstrates that all internal authentication and authorisation functions operate correctly when external internet connectivity is severed
- Identity-critical cryptographic operations are performed in HSMs physically located within the organisation's jurisdiction and under its exclusive administrative control
- The organisation can issue and verify W3C Verifiable Credentials or equivalent decentralised identity artefacts without relying on external trust infrastructure
Regulatory mappings
| Regulation | Articles | Risk | Note |
|---|---|---|---|
GDPR | art-5, art-25, art-32 | minimal | Full self-hosting eliminates cross-border transfer risks; data-protection-by-design (Art 25) and security measures (Art 32) are entirely within organisational control |
NDSG | art-7, art-8 | minimal | Complete control over identity processing fully satisfies Art 8 security requirements and enables comprehensive Art 7 transparency |
NIS2 | art-21 | minimal | Elimination of third-party identity dependencies removes supply-chain risk (Art 21(2)(d)); self-managed FIDO2 and conditional access exceed Art 21 MFA requirements |
DORA | art-9 | minimal | No ICT third-party concentration risk for identity services; the organisation's ICT risk management framework for identity is fully autonomous |
CLOUD-ACT | 18-usc-2703 | minimal | No US-jurisdictional provider has access to or control over identity data; CLOUD Act compelled disclosure is not applicable to the identity plane |
Risk if stagnant
Level 4 represents the maximum sovereignty posture, but it carries the highest operational burden. Without sustained investment in internal IAM engineering, security research, and infrastructure operations, the self-hosted identity stack will accumulate technical debt, miss critical security patches, and potentially become less secure than a well-managed cloud provider. Autonomy without operational excellence is a liability, not an asset.
What defines Level 4
The distinguishing characteristic of Level 4 is zero external dependency for identity operations. This goes beyond self-hosting the IdP (Level 3) to encompass every supporting service:
- Certificate authority. The organisation operates its own internal CA for TLS certificates used in identity flows, eliminating dependency on public CA providers for internal authentication.
- MFA infrastructure. FIDO2 attestation, TOTP seed generation, and hardware token provisioning are handled entirely in-house. No authentication step requires a call to an external service.
- DNS and service discovery. Internal identity services can resolve and route without external DNS dependency, ensuring authentication continues during internet outages or DNS-based attacks.
- HSM-backed key management. All identity-critical cryptographic material - SAML/OIDC signing keys, token encryption keys, CA private keys - resides in hardware security modules under the organisation's physical and administrative control.
Decentralised identity readiness
Level 4 organisations are positioned to participate in decentralised identity ecosystems. The W3C Verifiable Credentials (VC) and Decentralised Identifiers (DID) standards enable trust relationships between organisations without requiring a shared centralised identity provider.
Practical applications include:
- Employee credential portability. Issuing verifiable credentials that employees can present to partner organisations without the issuing organisation maintaining a real-time federation link.
- Supply-chain identity. Verifying the identity of vendors, contractors, and partners using cryptographically verifiable credentials rather than shared Active Directory trusts or SAML federations.
- Regulatory attestation. Issuing machine-verifiable credentials that attest to compliance status, professional certifications, or security clearances.
Decentralised identity is not mandatory at Level 4 - the criterion requires either implementation or a documented capability to implement. The core requirement is that the organisation's identity infrastructure is architecturally capable of participating in decentralised trust models.
Operational reality
Level 4 demands the highest level of internal operational capability:
- Dedicated IAM engineering team. The organisation needs staff with deep expertise in identity protocols (SAML, OIDC, SCIM, LDAP), cryptography, and infrastructure operations. This is typically a team of 3-5 engineers for a mid-sized organisation.
- 24/7 identity operations. The IdP is a Tier-0 service. Outages must be resolved within minutes, not hours. On-call rotations and automated failover are mandatory.
- Security research awareness. Without a cloud provider's security team monitoring for identity-layer vulnerabilities, the organisation must track CVEs, zero-days, and protocol-level attacks affecting its identity stack independently.
- Regular resilience testing. The annual isolation test - verifying that authentication works without external connectivity - is a defining practice at Level 4. Organisations should also conduct red-team exercises specifically targeting the identity infrastructure.
When Level 4 is warranted
Full identity autonomy is appropriate for organisations that:
- Process highly classified or sovereignty-sensitive data where any external identity dependency is unacceptable
- Operate in regulated sectors (defence, critical infrastructure, banking) where regulators explicitly require self-managed identity controls
- Have experienced or are specifically threatened by state-level adversaries capable of compelling cloud providers to modify authentication behaviour
- Possess the engineering talent and operational maturity to sustain a self-managed identity platform at enterprise scale
When Level 4 is excessive
For many organisations, Level 3 (Controlled) provides sufficient sovereignty with lower operational risk. Level 4 should not be pursued as a default aspiration - it should be a deliberate decision driven by a specific threat model and risk appetite, backed by a credible operational plan.
Sovereignty posture
At Level 4 the organisation has no external identity dependencies. No foreign government can compel a provider to disclose directory data or modify authentication behaviour, because no such provider exists in the architecture. The organisation's identity sovereignty is limited only by its own operational competence.